encryption
Study examining the usage of hardware-based encrypting drives
The Trusted Computing Group (TCG) and Ponemon Institute released a full report on the perceptions about self-encrypting drives. The study interviewed 517 IT practitioners in …
French certification authority reveals its private key by mistake
Certigna, a major French certification authority whose certificates are trusted in all of today’s most popular browsers – IE, Firefox, Safari, Opera, and many …
Concerned with the vulnerability of authentication tokens?
Since RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens, organizations …
Flashback: Encrypted backups for Android
Flashback provides encrypted backups to the cloud, giving you reliable access to your data along with the peace of mind that it’s secure. Flashback allows you to backup …
Encrypt files on Mac with BestCrypt
Jetico announced that their popular BestCrypt Container Encryption software now offers full compatibility with Mac computers. The software delivers data protection. Selected …
iPhone hardware encryption investigated
Users of Apple iPhone devices accumulate huge amounts of highly sensitive information stored in their smartphones. Historical geolocation data, viewed Google maps and routes, …
OpenSSL weakness can expose sensitive information
A weakness has been reported in OpenSSL, which can be exploited by malicious people to disclose potentially sensitive information, according to Secunia. The weakness is caused …
Mobile Encryption for iOS and Android
Sophos announced a number of new enterprise product lines that together offer protection anywhere and on any device. Sophos Mobile Control provides lightweight device …
PC Lock protects from identity theft, privacy invasion
Laplink released PC Lock, data encryption software with cloud management. Its Web Management Console lets users modify preferences, change settings, reset passwords, lock the …
41% carry unprotected sensitive information on mobile devices
41 percent of what should be a security savvy audience are carrying sensitive information on mobile devices unprotected, according to Origin Storage. In fact, 19 percent …
Self-encrypting drives most effective against data breaches
With more than 82 percent of respondents reporting one or more data breaches, a new Ponemon Institute study on self-encrypting drives found that 70 percent believed that …
Securing the cloud and securing data in the cloud are not the same
This article will take a look at five of the most impactful vulnerabilities of storing data in the cloud, and offer details on why the most important thing for CSOs and …
Featured news
Resources
Don't miss
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
- New framework aims to outsmart malware evasion tricks
- Finding connection and resilience as a CISO
- AI isn’t taking over the world, but here’s what you should worry about
- Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations