Data encryption News
April 10, 2017
As hyper-convergence matures, VMware bulks up vSAN 6.6 release with native encryption, analytics and improved availability, performance and management.
April 07, 2017
News Roundup: 'Hand-to-hand' combat in State Department hack, APT29 has a stealth backdoor, the creator of the internet backs strong encryption, and more.
April 05, 2017
In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the latest round of the encryption debate and what it means for apps that use strong encryption.
March 31, 2017
Messaging app developers will be offered 'three or four' legislative and non-legislative options for encryption backdoor access for EU law enforcement.
Data encryption Get Started
Bring yourself up to speed with our introductory content
These best design practices will help developers maximize the ability to update configurations or add new functionality after IoT devices leave the factory. Continue Reading
To secure the exploding number of IP connected created by IoT, big data and cloud services, connections must be underpinned by encryption and a VPN. Continue Reading
There's been a great deal of buzz around the Windows Server 2016 Hyper-V feature, VM shielding. But how exactly does VM shielding work, and what benefits does it bring? Continue Reading
Evaluate Data encryption Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Live migration of VMs isn't a new technology, but vMotion encryption adds a unique layer of security because the user isn't encrypting the network. Continue Reading
VDI environments are in danger of ransomware attacks. They can encrypt personal and professional data that cannot be decoded once the user's session ends. Continue Reading
Encryption is just one important element of backup data security in the cloud. Ask the right questions of your organization and your cloud provider to make sure your data is safe. Continue Reading
Manage Data encryption
Learn to apply best practices and optimize your operations.
With application whitelisting, admins can create a list of approved apps users can work with. This way, users cannot accidentally open an app containing ransomware. Continue Reading
There is so much to keep in mind with Windows 10 security it's easy to overlook the essentials. Get back to basics and remember to keep an eye on updates, encryption and users. Continue Reading
Putting thousands of cores to work makes perfect sense when you're powering a video game. But graphics processing units, or GPUs, can't serve much practical purpose in a corporate data center, can they?
The GPU vs. CPU discussion isn't as odd as it sounds. In fact, a more broad application of GPUs in the data center can provide the processing punch that CPUs simply cannot. With tasks where data can be processed in parallel rather than in sequence, GPUs might be a particularly valuable tool. The cover story in this issue of Modern Infrastructure looks at scenarios where simultaneous processing can be just what's needed, such as with machine learning and artificial intelligence.
This month's Modern Infrastructure also looks at how data can be protected while in the data center. Full encryption is seemingly a perfect defense for data theft. But that's a difficult -- and, to some, an unrealistic-- road to travel. We look at how an IT team can better safeguard its data, factoring in costs, the tools available and the tradeoffs involved in hack-proofing an organization's data.
And what about the vulnerabilities that arise from within your business? We examine the risk of data loss posed by the shadow IT phenomenon, an ongoing and ever-changing challenge.
It's clear that data is an increasingly valuable resource. Processing it and keeping it safe -- whether that entails taking up the question of GPU vs. CPU for certain workloads or upgrading encryption -- need to be priorities for IT professionals in organizations of all sizes and types.Continue Reading
Problem Solve Data encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When it comes to encryption, the HIPAA implementation specifications are complicated. Expert Joseph Granneman explains whether it's required or addressable. Continue Reading
Unified communications security is venturing into unknown territory with the growing trend of embedding communications into business applications. New security challenges could emerge for IT as ... Continue Reading
With ransomware threats so prevalent, one way to start your organization's protection strategy is to make sure critical data backups are disconnected from primary storage. Continue Reading