Data encryption News
January 11, 2017
MySQL under the Oracle flag has not been without controversy. But the MySQL Enterprise Edition fits the bill for makers of a trading platform with demanding customers.
January 09, 2017
A recent survey illustrates how extensive ransomware threats have been, and Rich Castagna says backing up data remains your best defense
December 15, 2016
A second Yahoo breach was disclosed, with more than 1 billion accounts compromised and users left at risk of further attacks for three years.
November 17, 2016
Will President-elect Trump's transition team follow through on promises to get rid of Dodd-Frank compliance regulations? Also in recent GRC news, tech companies urge Trump to back encryption; and ...
Data encryption Get Started
Bring yourself up to speed with our introductory content
There's been a great deal of buzz around the Windows Server 2016 Hyper-V feature, VM shielding. But how exactly does VM shielding work, and what benefits does it bring? Continue Reading
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
The Lenovo SHAREit file-sharing app has a hardcoded password vulnerability, among other issues. Expert Michael Cobb explains these flaws and how to prevent exploits on them. Continue Reading
Evaluate Data encryption Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.
Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.
Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.
As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.
Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.
Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.
Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.
Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.Continue Reading
VMware debuts new security features, such as Secure Boot and VM Encryption, and added the ability to run any application on the same vSphere host in vSphere 6.5. Continue Reading
Will Google's latest Android operating system benefit enterprises? Upgraded features such as file-based encryption and seamless updates may make Nougat a fit for business. Continue Reading
Manage Data encryption
Learn to apply best practices and optimize your operations.
Before wading into a data lake to help with protection, it's important to analyze what you're doing with your data and its backup and disaster recovery. Continue Reading
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
With the portability of tapes and the ability to store terabytes of data on a single cartridge, appropriate security of tape backup storage is imperative. Continue Reading
Problem Solve Data encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A well-known PGP short key ID flaw has been discovered to be the cause of collision attacks on Linux developers. Expert Michael Cobb explains the flaw with short key IDs. Continue Reading
HEIST, a new HTTP/2 protocol exploit, can steal encrypted content from HTTPS traffic. Expert Michael Cobb explains how this attack works and how to stop it. Continue Reading
Destroying a decryption key isn't the same as destroying the data, but which method is more secure? Expert Mike Chapple explains the best way to combat a future encryption flaw. Continue Reading