Email Alerts
-
Should log traffic be encrypted?
Should you be encrypting your security log transmissions? "It depends!" explains Mike Chapple in this SearchSecurity.com expert Q&A. Ask the Expert
-
When choosing a digital certificate, how important is the expiration period?
In this expert Q&A, application security pro Michael Cobb helps you plan your digital certificate policy. Cobb emphasizes the importance of keeping your Web server certificates up-to-date. Ask the Expert
-
What are the best authentication tools for locking down a laptop?
Stolen laptops continue to be a troublesome issue for businesses. In this Identity Management and Access Control Ask the Expert Q&A, Joel Dubin reviews the best available authentication and encryption tools for securing company laptops. Ask the Expert
-
Password-protecting removable media devices
Safeguard your removable devices. Learn if any products can password-protect the entire device without requiring that the individual connections are encrypted, in this identity management and access control Q&A. Ask the Expert
-
Secure email exchange: Establishing security associations
What happens if a security association can not be established during an email exchange? Michael Cobb has the answer. Answer
-
How to prevent drive corruption in the event of power failure
In this Ask the Expert Q&A, learn how a PDA device stores data and programs. Also learn how Compact Flash cards and hard drives differ and what some are doing to prevent drive corruption in the event of power failure. Ask the Expert
-
Encryption and password protection methods for removable storage devices
In this Ask the Expert Q&A our platform security expert explains how to use encryption and passwords to secure removable storage devices. Ask the Expert
-
What is a sufficient encryption?
Ask the Expert
-
Can you recommend RC4 128-bit encrypted software?
Ask the Expert
-
One-time pads explained
Ask the Expert
Security Management Strategies for the CIO