Disk Encryption and File Encryption
- January 10, 2014
Executive Editor Eric B. Parizo explains why the 2014 RSA Conference boycott, like the MLB Hall of Fame voting, is driven by a crisis of conscience.
- December 18, 2013
CloudFlare hopes its open-sourced Red October server encryption software, based on the 'two-man rule,' can help thwart rogue insiders and secure Web.
- October 30, 2013
The PCI SSC says hardware-based point-to-point encryption (P2PE) will better secure merchant card data and make PCI DSS compliance easier.
- June 17, 2013
Opinion: Gary McGraw details the various and sundry NSA data collection programs and explains why all its efforts demand new discussion and scrutiny.
- March 20, 2013
Cisco has issued a security advisory after Hashcat researchers disclosed a password flaw in IOS and IOS XE devices that enable brute-force attacks.
- December 19, 2012
Dell said the addition of Credant bolsters its data protection strategy by adding encryption capabilities for laptops and mobile devices.
- November 15, 2012
Stolen laptop contained the sensitive data on a large number of employees and contractors. The information was not encrypted.
- July 30, 2012
Researcher Peter Hannay's man-in-the-middle attack exploited an SSL handing flaw to remotely wipe Android and iOS mobile devices via Exchange server.
- May 02, 2012
New PCI DSS guidance on point-to-point encryption outlines product testing requirements, and urges more merchant-acquirer collaboration.
- October 25, 2011
Researchers in Germany have demonstrated weaknesses in the W3C XML encryption standard used to secure websites and other Web applications.
- September 16, 2011
A new validation program will certify point-to-point encryption systems that use devices for encryption and decryption as well as hardware security modules.
- March 15, 2011
A Ponemon Institute survey of more than 500 auditors finds most prefer data encryption over tokenization to protect sensitive data.
- November 16, 2010
Encryption has become generally accepted in the industry, said Larry Ponemon, founder of the Ponemon Institute LLC.
- October 13, 2010
The PCI Council's latest guidance document for point-to-point encryption calls the market for the technology too immature and warns merchants that vendor lock-in could be a problem.
- June 23, 2010
Payment industry executives and security experts are currently debating over the right way to preserve and protect credit card data. Merchants can choose between a variety of formats, from format preserving encryption, which replaces the 16-digit ...