Service level agreements

Data encryption News

  • June 29, 2016 29 Jun'16

    10 million hospital patient records up for sale on dark web market

    Nearly 10 million patient records have been posted for sale on a dark web market, putting the personally identifiable information of many at risk for abuse.

  • June 24, 2016 24 Jun'16

    Blockchain GRC: The innovation and regulatory balance

    Blockchain technology, a distributed ledger that underpins cryptocurrencies, has become a huge factor the financial services space as virtual currencies such as bitcoin have become increasingly popular. The rise of blockchain could radically change how monetary transactions are conducted all over the globe, causing major disruptions for the finance industry. And as with anything to do with the exchange of money, the rise of blockchain is raising compliance and cybersecurity questions both for corporations and the consumers they serve. In this handbook, learn about these calls to regulate the exchange of virtual currencies, and why some are concerned these rules could hinder blockchain technologies' innovative traits that benefit industries far beyond the financial field.

  • June 20, 2016 20 Jun'16

    CIA chief denies encryption backdoor effect on U.S. business

    The director of the CIA denied that a government-mandated encryption backdoor would have an effect on U.S. business, but experts said the statement ignores the global market.

  • May 26, 2016 26 May'16

    Will our failure to unravel the politics of privacy, security and choice cost more than Brexit?

    Effective pan-EU co-operation to redress the balance and build confidence in safer, more secure on-line world could have a bigger impact on our wallets than the putative benefits or costs of Brexit ...

View All News

Data encryption Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data encryption Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Data encryption

Learn to apply best practices and optimize your operations.

  • Mobile risk management falls short in Global 2000

    The majority of companies lack mobile policies around access and storage of corporate data, according to one study. Is your organization one of them? Continue Reading

  • Enterprise mobile strategy: Step up security

    CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization to protect the data layer. An effective enterprise mobile strategy can increase employee productivity, but how can security programs strike a balance between user experience and information security? In this issue of Information Security, we talk to companies about their enterprise mobile strategies to find out what works and what doesn't.

    Even with all the momentum in advanced authentication, some enterprises show no signs of moving beyond usernames and passwords. Why isn't advanced authentication, such as one-time passwords or multifactor authentication (MFA), widely deployed? Despite the challenges of implementing and maintaining strong authentication methods, they provide significant benefits over password-only authentication mechanisms. The consumerization of MFA may lower costs. We look at strong authentication strategies and best practices for these methods on premises and in the cloud.

    Also, we continue our Readers' Top Picks series with a look at enterprise encryption tools. TechTarget polled 1,435 IT and security professionals at medium-to-large enterprises who told us that they have active encryption projects or technology purchases in the next 12 months. Look for a shortlist of products and features from readers who plan to invest in enterprise encryption tools.

     Continue Reading

  • In AWS encryption, a little paranoia goes a long way

    IT teams must take a layered approach to AWS security, and encryption is no different. Each Amazon service has different security characteristics, requiring the right security tool. Continue Reading

View All Manage

Problem Solve Data encryption Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close