encryption
SSL governance and implementation across the Internet
Philippe Courtot, founder of the Trustworthy Internet Movement (TIM), and chairman and CEO of Qualys, talks about how the TIM has chosen SSL governance and implementation …
Intel strengthens security of its Core vPro platform
Intel announced the availability of its 3rd Generation Intel Core vPro processor-based platforms for business and intelligent systems. New capabilities embed security at every …
Cloud data encryption for Hosted Exchange
Vaultive announced Vaultive for Hosted Exchange, a cloud data encryption solution that enables customers to encrypt data-at-rest and data-in-use within the Hosted Microsoft …
Secure online voting on iOS and Android
Scytl announced today the successful implementation of its online voting encryption technology for use on Android and iOS. By encrypting the ballot on the voter’s device …
Fuzz-o-Matic finds critical flaw in OpenSSL
Codenomicon helped identify and a critical flaw in widely-used encryption software. A flaw in the OpenSSL handling of CBC mode ciphersuites in TLS 1.1, 1.2 and DTLS can be …
Encrypted flash drive with two-factor authentication
GoldKey announced its line of GoldKey Tokens with Built-In Flash that provide hardware-encrypted secure flash along with a built-in Smart Card and GoldKey’s enhanced …
Security and management for iOS
3LM released version 3.0 of its security and management platform which extends 3LM’s Mobile Device and Application Management (MDAM) support to any Android OS-based …
Healthcare concerns over data loss increase
While approaches to patient data protection have evolved over the past several years, the aggressive transition to electronic health records (EHR) and the consumerization of …
Global dashboard for monitoring the quality of SSL support
Last week we announced SSL Pulse, a continuously updated dashboard that is designed to show the state of the SSL ecosystem at a glance. While it is possible today to deploy …
Enterprise encryption with near zero overhead
Vormetric announced Vormetric Encryption V5, which significantly reduces the cost and application impact of encryption by using software enhancements and hardware encryption …
Businesses fail to learn from 2011 data breaches
While data breaches perpetuated during 2011 clearly demonstrated the need for more comprehensive encryption of business and customer data, a survey of over 170 IT managers …
DarkComer RAT disguised as Skype encryption software
A while ago, Syrian dissidents claimed that the government uses malware to spy on them. The malware was delivered through compromised email accounts of other opposition …
Featured news
Resources
Don't miss
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)
- RIFT: New open-source tool from Microsoft helps analyze Rust malware
- Are we securing AI like the rest of the cloud?
- How exposure-enriched SOC data can cut cyberattacks in half by 2028
- Europe’s AI strategy: Smart caution or missed opportunity?