Email Alerts
-
Should PKI systems be used for laptop encryption?
In this expert reponse, Joel Dubin discusses the pros and cons of using PKI systems for laptop encryption. Ask the Expert
-
How can a corporation assess the costs of whole-disk encryption?
Security management pro Mike Rothman explains how an enterprise can estimate the costs of implementing whole-disk encryption. Ask the Expert
-
Is encrypting cookies a PCI DSS requirement?
Security management expert Mike Rothman discusses whether or not storing sensitive information in the form of a cookie is considered a violation of PCI DSS. Ask the Expert
-
How should sensitive customer data, such as driver's license information, be handled?
In this Q&A, Identity management and access control expert Joel Dubin discusses how to properly protect the personal data of a driver's license. Ask the Expert
-
What are the best laptop data encryption options?
When it comes to protecting laptops and hard drives, there are plenty of choices. In this expert Q&A, Michael Cobb lays out some data protection options. And they're not just software-based, either. Ask the Expert
-
What are the risks of turning off pre-boot authentication?
In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin discusses the dangers associated with turning off pre-boot authentication (PBA)? Ask the Expert
-
Will the PCI DSS require encryption over dedicated lines?
Currently, the PCI Data Security Standard mandates the encryption of any wireless transmissions, but should security professionals be ready to encrypt transmissions over dedicated lines? In this expert Q&A, expert Mike Chapple reveals which PCI chang... Ask the Expert
-
Are encryption products better than self-destructing data?
Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds." Ask the Expert
-
Which Unix programs can encrypt database files?
Options may seem slim for Unix users looking to encrypt their database files. In this expert Q&A, platform security expert Michael Cobb explains whether encrypting and decrypting an entire production database is worth it to begin with. Ask the Expert
-
Should full disk encryption be used to prevent data loss?
According to a Ponemon Institute survey done in August 2006, eighty-one percent of companies reported the loss of one or more laptops during a 12 month period. In this SearchSecurity.com Q&A, platform security Michael Cobb explains whether that means... Ask the Expert
Security Management Strategies for the CIO