Crypto-currency and security: Is Bitcoin safe?

Enterprise Data Governance

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Are open recursive DNS servers inherently insecure?

    Recursion was meant to make the Internet run better, but expert Michael Cobb explains why the willingness of malicious users to abuse open recursive DNS servers has made it part of numerous ongoing threats. 

  • Should whole disk encryption tools be used with data backup software?

    Disk encryption and disk backup play two distinct roles when it comes to enterprise network security. Michael Cobb explains how both of the important tools can be used together effectively. 

  • Worst practices: Learning from bad security tips

    In this tip, information security threats expert Ed Skoudis exposes some bad security practices, highlights the common and dangerous misconceptions held by security personnel, and offers insight on how corporations can learn from others' mistakes. 

  • The ins and outs of database encryption

    While pundits and gurus may say the "easy" data protection option is for an enterprise to encrypt its entire database, the truth is it's much harder than many realize. In this tip, database security expert Rich Mogull examines the two primary use cas... 

  • RSA attendees see data classification, rights management projects stumble

    SAN FRANCISCO -- Companies need to embark on data classification projects to gain more control over its movement and minimize data leakage, but it's difficult to find a company successfully carrying out a project. Rena Mears, Deloitte's global and U.... 

  • Worst practices: Encryption conniptions

    Through the years, SearchSecurity.com's expert contributors have no doubt spent much of their time pointing out a variety of security best practices. But what about the worst practices? In honor of April Fools' Day, network security expert Mi... 

  • Does FTPS encrypt data packets at the hardware or software level?

    If you need to implement FTPS, which delivers a lot of data securely to a server, it might be worth investigating partial or complete hardware acceleration of the crypto-processing. Platform security expert Michael Cobb explains why. 

  • Should disks be encrypted at the hardware level?

    Disks that automatically encrypt data as they write -- and decrypt when they read -- are appealing for a number of reasons. Platform security expert Michael Cobb explains why. 

  • Is Triple DES a more secure encryption scheme than DUKPT?

    Both DES and TDES use a symmetric key, but Michael Cobb explains their separate and distinct roles in protecting financial transactions. 

  • E-discovery management: How IT should interact with the legal team

    Amid the growing important of electronic discovery, it's critical that an organization's IT team strike a good working relationship with its legal team. But this can be un-chartered territory for IT personnel. In this tip, contributor Trent Henry sup...