Email Alerts
-
Laptop crypto: Do it, but realize it's not a panacea
Laptop encryption has its pros and cons. Find out how to use laptop crypto to keep your sensitive data secure -- even if it falls in the hands of the enemy. Tip
-
The 5 A's of functional SAN security
This tip examines why admins should follow the 5 A's of SAN security: Authentication, access, audits, alarms and availability, to keep their SAN secure. Tip
-
Smart options for safeguarding stored data
Learn the three basic ways to encrypt sensitive data: encryption at the source, encryption with a backup application and hardware encryption, as well as the advantages and disadvantages of each option. Tip
-
Protect files and folders from snoops
Read this tip and learn about four specific steps you can take to secure your desktop files and folders. Tip
-
Expert advice: Encryption 101 -- Triple DES explained
Here is Jon Callas full expert response to a recent user question on Triple DES in Ask the Expert. Tip
-
Hot Pick: CryptoStor for Tape FC
This Hot Pick reviews storage security appliance CryptoStor for Tape FC. Tip
-
Cryptography basics for infosecurity managers
Mike Chapple explains the basics of cryptography. Tip
-
DES is not sufficient
How to harden DES if you are still using it. Tip
-
Enable 802.1x security in Windows 2000
Microsoft has produced a support package that adds 802.1x support to Windows 2000. Tip
-
Windows-based file encryption may corrupt data
Windows-based file encryption may corrupt data depending on the platform you are using. Read about the workaround in this tip. Tip
Security Management Strategies for the CIO