Encryption

It’s prediction season again and I’ve written a piece for CSO Australia. Here’s how it starts…    “2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that appeared on the radar in 2012…

+ read more

ianyip
By: ianyip
Dec 20, 2013
9:39 am
Reads:
2,559
Score:
Unrated

Tired of bumping into complex keytool commands for importing trusted root certificates in your keystore? Here is a pair of tools that can expedite the process for you.

mbluteau
By: mbluteau
Feb 24, 2012
2:50 pm
Reads:
3,170
Score:
5

Next week I’ll be speaking at the CSO Executive Seminar on Data Protection and Encryption in Washington, D.C. My presentation will focus on doing more with less in a time when security and compliance teams are stretched thin due to staff and budget cuts. I will touch on aligning security investments with key business objectives…

+ read more

NetIQ
By: NetIQ
Feb 2, 2010
9:49 am
Reads:
1,857
Score:
Unrated

Bruce Schneier always seems to find the best security stories.  This one involves a story in which an encrypted USB device containing records of some 6,000+ patients was lost from a UK hospital.  Of course remembering all those pesky passwords can be annoying, so someone had thoughtfully taped the password to the USB device for…

+ read more

GeoffWebb
By: GeoffWebb
Jan 14, 2009
11:14 am
Reads:
1,389
Score:
Unrated

Several readers have responded with their approaches for laptop encryption – without Active Directory. Read their comments here …

Sep 13, 2006
12:00 am
Reads:
1,166
Score:
Unrated