encryption
The crucial role of crypto technologies
Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …
The growth of cryptography
It’s not every day that Euclid appears in public with “Alice and Bob,” but in a lecture spanning a few thousand years, Ronald Rivest, a member of MIT’s …
Toshiba e-Studio855SE series with advanced security features
Toshiba introduced their new e-STUDIO855SE Series (models 555SE, 655SE, 755SE, 855SE) which provides Hard Disk Drive (HDD) Encryption and Data Overwrite out of the box. …
Encrypt computer data with a physical key
LucidPort Technology introduced the CipherGuard Computer Encryption System. The CipherGuard secures the private data on a computer with a physical key. The CipherGuard creates …
Cloud encryption software for private cloud infrastructures
CREDANT announced the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. With this launch, the company …
Scalable SSL inspection appliances
Netronome announced the addition of three new products to their line of SSL Inspector appliances. The new products include fixed-configuration 1U appliances as well as modular …
Hardware security modules for cryptographic protection
Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …
Central management of self-encrypting hard drives
Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …
Researcher offers free voice and text encryption app to Egyptians
The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …
SSL certificates for Intel Core vPro processors
Entrust has added SSL certificates for Intel Core vPro processors to its large portfolio of digital certificate offerings. This new capability, core to an identity-based …
Data Breach and Encryption Handbook
Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …
Changing the status quo for security
When a problem is recognized that impacts virtually everyone and a group of experts provides a solution, what can possibly prevent the solution from being used? If the problem …
Featured news
Resources
Don't miss
- KillChainGraph: Researchers test machine learning framework for mapping attacker behavior
- AIDEFEND: Free AI defense framework
- Boards are being told to rethink their role in cybersecurity
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
- New framework aims to outsmart malware evasion tricks