encryption
Control and encrypt email with CipherPost Pro
AppRiver unveiled a secure email delivery solution, CipherPost Pro, a service that allows businesses to control and encrypt email and email attachments. CipherPost Pro …
Universal IPsec VPN client for Android 4.0
NCP engineering released a preview version of its IPsec VPN client to support the remote access needs of Android 4.0 (Ice Cream Sandwich) platform users. The NCP Secure …
Scalable network encryption for the cloud
Certes Networks announced the vCEP (virtual Certes Enforcement Point), a scalable network encryption solution for the cloud. This virtual appliance allows organizations to …
Enterprise encryption and key management strategy
Encryption technologies are being implemented in a disorganized, ad hoc manner that leads to increased security risks and costs, according to a report by Jon Oltsik, Senior …
SSL/TLS deployment best practices
SSL/TLS is a deceptively simple technology. It is easy to deploy, and it just works-¦ except that it does not, really. The first part is true – SSL is easy to deploy …
CipherUSB: Encryption for Flash, USB or optical drives
Addonics announced CipherUSB, a USB pass-through adapter that provides a way to encrypt data stored on flash drives, flash media, USB hard drives as well as Blu-ray, DVD or CD …
White box cryptography software protection
SafeNet announced a software protection solution that includes white box cryptography. The SafeNet Sentinel portfolio of software licensing and protection solutions now …
File transfer with end-to-end encryption
Steganos Software announced Elefile – a secure web-based file transfer solution that can be used on any computer or laptop without installing software. Created for …
Non-native encrypted tape extraction
RenewData now offers the non-native extraction and restoration of encrypted tapes. With the addition of this capability, clients can react to legal matters or regulatory …
Mozilla testing default Google search encryption in Firefox
Firefox users should soon have encryption turned on by default when searching for things online via the built-in Google search engine, Mozilla confirmed. The change has been …
GSM cracking revelations are profound
Commenting on news reports that an Indian company has revealed it can tumble and clone the credentials of mobile phone SIM cards over the airwaves – apparently because …
Are mobile password apps pointless?
ElcomSoft analyzed 17 popular password management apps available for Apple iOS and BlackBerry platforms, including free and commercially available tools, and discovered that …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)