Encryption is an interesting thing. The first time I saw encryption in action was on a friend’s Gentoo Linux laptop that could only boot if the USB key with the boot partition and decryption key was ...
Palo Alto, Calif.-based encryption vendor PGP on Monday released updates to its core product line, PGP Encryption Platform and Universal Server, to better lock down information and allow resellers the ...
Organizations are starting to take an interest in homomorphic encryption, which allows computation to be performed directly on encrypted data without requiring access to a secret key. While the ...
In response to dramatic and widely-publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the ...
Tor, the (in)famous encrypted web browser, may not be strong enough to resist the next generation’s attacks on encryption. What will the next generation of encryption tools look like? Tor came to the ...
Portable SSD encryption protects sensitive data through hardware-level security, authentication, and automatic locking. It ensures files remain unreadable even if devices are lost, stolen, or ...
The Jericho Forum is an organization pushing for innovation in e-commerce security. In this essay, Joerg Horn, head of gateway solutions at Utimaco, a Jericho Forum member, discusses combining ...
While encryption is not a cure-all to address every security challenge, done right, it is an essential component for securing systems, data, and communications. However, doing encryption right is not ...
CANCUN, MEXICO: Are encryption tools used by terrorist organizations truly secure, or are they nothing more than a publicity stunt? "Terrorists love forums," Rodrigo Bijou from data solutions provider ...
Most of us—at least the cynical ones—assume that the NSA has probably beaten most of the encryption technologies out there. But a new report from Der Spiegel that draws on documents from Edward ...
There was a time when a whistleblower had to rely on the Postal Service, or a pay phone, or an underground parking garage to leak to the press. This is a different time. A renewed interest in leaks ...