Encryption software solutions
New & Notable
Encryption software solutions News
-
March 27, 2018
27
Mar'18
MIT: Energy-efficient chip improves IoT encryption, authentication
MIT researchers have developed an energy-efficient, hard-wired chip that they say will benefit IoT encryption and ease authentication processes in the IoT environment.
-
February 23, 2018
23
Feb'18
IT turns to VMware encryption for added VM security
Encryption features in recent vSphere and vSAN updates aim to balance security with simplicity and performance. For VMware shops, there is little standing in the way of adoption.
-
December 19, 2016
19
Dec'16
GRC news roundup: Russian hacking allegations persist
After the U.S. was allegedly plagued by Russian cyberattacks during the election, members of both the Democratic and Republican parties are now calling for investigations. Also in recent GRC news: ...
-
November 17, 2016
17
Nov'16
GRC roundup: Trump's transition team looks to dismantle Dodd-Frank
Will President-elect Trump's transition team follow through on promises to get rid of Dodd-Frank compliance regulations? Also in recent GRC news, tech companies urge Trump to back encryption; and ...
Encryption software solutions Get Started
Bring yourself up to speed with our introductory content
-
How to use a public key and private key in digital signatures
Ensuring authenticity of online communications is critical to conduct business. Learn how to use a public key and private key in digital signatures to manage electronic documents. Continue Reading
-
going dark
Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel. Continue Reading
-
Blockchain use cases, private vs. public debate engross community
The blockchain industry is hashing out how to determine a good blockchain use case, debating the usefulness of private blockchains and mapping out how regulators might benefit. Continue Reading
Evaluate Encryption software solutions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Weighing double key encryption challenges, payoffs
Microsoft's new double key encryption offering brings data security and compliance benefits. Are they worth the implementation challenges? Continue Reading
-
A closer look at new and updated Microsoft security features
Microsoft augments the native protection features in its newer Windows Server releases with cloud-based security products to reduce the likelihood of a successful breach attempt. Continue Reading
-
Blockchain market outlook: Hype vs. reality
There are predictions that the blockchain market will change the nature of business transactions. But how much of that is hype? One analyst weighs in on the topic. Continue Reading
Manage Encryption software solutions
Learn to apply best practices and optimize your operations.
-
Information security monitoring, analytics for the digital age
In this webcast, learn automated information security monitoring and analytic techniques to protect data in the face of rapidly evolving cyberthreats. Continue Reading
-
Data protection and security incident response when all information is a target
Data breaches have become increasingly commonplace for businesses, and every company that has an online presence is a potential target for hackers: High-profile hacks of Target Corp. and Anthem Inc., to name a few, show how valuable personal data ... Continue Reading
-
'Going dark': Weighing the public safety costs of end-to-end encryption
'Going dark' -- or the FBI's inability to access data because of encryption -- could put public safety at risk, intelligence officials say. But tech companies argue that strong encryption is needed to protect corporate and customer data. Continue Reading
Problem Solve Encryption software solutions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
How does Microsoft BitLocker secure local, cloud resources?
The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center and in the Azure cloud platform. Continue Reading
-
Does using ISO 27000 to comply with PCI DSS make for better security?
PCI DSS is under fire for not providing enough security in the process of securing credit card data. Using ISO 27000 to complement PCI may provide better compliance and security. Continue Reading
-
What's the Massachusetts data protection law and what does it require?
Massachusetts' data protection law, 201 CMR 17.00, focuses on prevention rather than notification. Here are the technologies and policies you'll need for compliance. Continue Reading