Please turn on your JavaScript for this page to function normally.
The crucial role of crypto technologies

Crypto technologies play a crucial role in data protection and compliance activities across a wide range of industry sectors, in both private and public organizations, …

The growth of cryptography

It’s not every day that Euclid appears in public with “Alice and Bob,” but in a lecture spanning a few thousand years, Ronald Rivest, a member of MIT’s …

Toshiba e-Studio855SE series with advanced security features

Toshiba introduced their new e-STUDIO855SE Series (models 555SE, 655SE, 755SE, 855SE) which provides Hard Disk Drive (HDD) Encryption and Data Overwrite out of the box. …

Encrypt computer data with a physical key

LucidPort Technology introduced the CipherGuard Computer Encryption System. The CipherGuard secures the private data on a computer with a physical key. The CipherGuard creates …

Cloud encryption software for private cloud infrastructures

CREDANT announced the beta program for its cloud encryption software for virtual desktop infrastructure (VDI) private cloud infrastructures. With this launch, the company …

Scalable SSL inspection appliances

Netronome announced the addition of three new products to their line of SSL Inspector appliances. The new products include fixed-configuration 1U appliances as well as modular …

Hardware security modules for cryptographic protection

Thales announced that Thales nShield Solo hardware security modules (HSMs) have been integrated into Imprivata OneSign. Designed to protect cryptographic keys and sensitive …

Central management of self-encrypting hard drives

Lenovo and WinMagic announced SecureDoc for Lenovo, a full-disk encryption solution for central management of new self-encryption hard drives that meet the Opal standard …

Researcher offers free voice and text encryption app to Egyptians

The explosive situation in Egypt has mobilized many repression-hating individuals in the world to try to do something to support the country’s citizens in their efforts …

SSL certificates for Intel Core vPro processors

Entrust has added SSL certificates for Intel Core vPro processors to its large portfolio of digital certificate offerings. This new capability, core to an identity-based …

Data Breach and Encryption Handbook

Cybersecurity risks pose some of the most serious economic and national security challenges of the 21st century. A new book, Data Breach and Encryption Handbook, published by …

Changing the status quo for security

When a problem is recognized that impacts virtually everyone and a group of experts provides a solution, what can possibly prevent the solution from being used? If the problem …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools