Disk Encryption and File Encryption
- June 21, 2010
The software update helps enterprises coordinate the issuing of tokens among multiple data centers, and apply the technology to PII and PHI.
- May 03, 2010
As companies deploy encryption to protect cardholder data, French security giant, Thales Group is making the case for hardware security modules (HSMs) to protect the underlying key management systems at the heart of all encryption systems. According...
- April 29, 2010
Symantec said it would integrate PGP's key management platform into the Symantec Protection Center and add encryption capabilities to boost its endpoint protection offerings.
- March 04, 2010
Payment industry "buzz" term isn't really reality, say some industry experts at RSA Conference 2010.
- March 02, 2010
A good-natured spat between cryptography pioneers and a former NSA technical director spices up the annual Cryptographers' Panel at RSA Conference 2010.
- January 27, 2010
The next revision of PCI DSS will contain clarifications, but no major revisions, according to Bob Russo, general manager of the PCI Security Standards Council.
- November 19, 2009
A lost hard drive contained seven years of patient data including Social Security numbers and medical records of more than a million Health Net customers.
- October 26, 2009
Steven Elefant, CIO of Princeton, NJ-based Heartland Payment Systems Inc., is leading development on the payment processor's E3 end-to-end encryption plan and new secure payment terminals. Elefant, who joined Heartland last year, said the payment ...
- October 26, 2009
First Data Corp. uses RSA software for tokenization, providing a possible threat vector for attackers, says Heartland CIO Steven Elefant.
- October 07, 2009
Visa issued payment industry best practices that outline the use of encryption and tokenization to protect credit card data.
- October 02, 2009
Voltage cites performance issues and the creation of a repository of cardholder data an attractive target for attackers. RSA calls Voltage's claims unfounded.
- June 18, 2009
A new report from Forrester Research Inc. examines eight database and server data security technologies and recommends small steps that can make a big difference.
- April 29, 2009
It isn't always convenient to encrypt sensitive data as part of an e-discovery process, but a data management expert at the Computer Forensics Show said its use is essential.
- April 16, 2009
Increasing pressure to cut costs coupled with new compliance demands could have CISOs looking for answers at the 2009 RSA Conference.
- March 16, 2009
A new USB-like device, hardened with security features, could overtake one-time password devices and give end users flash memory to carry around encrypted data.