encryption
Encrypted flash drive with two-factor authentication
GoldKey announced its line of GoldKey Tokens with Built-In Flash that provide hardware-encrypted secure flash along with a built-in Smart Card and GoldKey’s enhanced …
Security and management for iOS
3LM released version 3.0 of its security and management platform which extends 3LM’s Mobile Device and Application Management (MDAM) support to any Android OS-based …
Healthcare concerns over data loss increase
While approaches to patient data protection have evolved over the past several years, the aggressive transition to electronic health records (EHR) and the consumerization of …
Global dashboard for monitoring the quality of SSL support
Last week we announced SSL Pulse, a continuously updated dashboard that is designed to show the state of the SSL ecosystem at a glance. While it is possible today to deploy …
Enterprise encryption with near zero overhead
Vormetric announced Vormetric Encryption V5, which significantly reduces the cost and application impact of encryption by using software enhancements and hardware encryption …
Businesses fail to learn from 2011 data breaches
While data breaches perpetuated during 2011 clearly demonstrated the need for more comprehensive encryption of business and customer data, a survey of over 170 IT managers …
DarkComer RAT disguised as Skype encryption software
A while ago, Syrian dissidents claimed that the government uses malware to spy on them. The malware was delivered through compromised email accounts of other opposition …
Control and encrypt email with CipherPost Pro
AppRiver unveiled a secure email delivery solution, CipherPost Pro, a service that allows businesses to control and encrypt email and email attachments. CipherPost Pro …
Universal IPsec VPN client for Android 4.0
NCP engineering released a preview version of its IPsec VPN client to support the remote access needs of Android 4.0 (Ice Cream Sandwich) platform users. The NCP Secure …
Scalable network encryption for the cloud
Certes Networks announced the vCEP (virtual Certes Enforcement Point), a scalable network encryption solution for the cloud. This virtual appliance allows organizations to …
Enterprise encryption and key management strategy
Encryption technologies are being implemented in a disorganized, ad hoc manner that leads to increased security risks and costs, according to a report by Jon Oltsik, Senior …
SSL/TLS deployment best practices
SSL/TLS is a deceptively simple technology. It is easy to deploy, and it just works-¦ except that it does not, really. The first part is true – SSL is easy to deploy …
Featured news
Resources
Don't miss
- The messy data trails of telehealth are becoming a security nightmare
- What Cloudflare’s 2025 internet review says about attacks, outages, and traffic shifts
- Update your Apple devices to fix actively exploited vulnerabilities! (CVE-2025-14174, CVE-2025-43529)
- Kali Linux 2025.4: New tools and “quality-of-life” improvements
- How researchers are teaching AI agents to ask for permission the right way