encryption - News, Features, and Slideshows
Bracket Computing is expanding its cloud-storage data protection offerings and has received an additional $46.4 million in venture funding to further develop its products and roll them out worldwide.
By Tim Greene | 14 October, 2015 21:54
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
By Lucian Constantin | 31 July, 2015 06:29
A group of suspected Russian hackers are using Twitter in a clever way to mask their data-stealing malware, according to computer security firm FireEye.
By Jeremy Kirk | 29 July, 2015 20:09
There's an old saying in the security community: Attacks always get better. The latest case where that holds true is for the aging RC4 cipher that's still widely used to encrypt communications on the Internet.
By Lucian Constantin | 17 July, 2015 00:38
A flaw in the widely used OpenSSL library could allow man-in-the-middle attackers to impersonate HTTPS servers and snoop on encrypted traffic. Most browsers are not affected, but other applications and embedded devices could be.
By Lucian Constantin | 10 July, 2015 01:39
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
Whitepapers about encryption
Endpoint security has been recognised by most companies as being a crucial component of corporate defence against security breaches. Find out why despite being confident in their existing protection strategy, most Australian companies have acknowledged there is still room for improvement.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCAndroid and iOS DevelopersVIC
- FTSecurity ArchitectWA
- CCTest AnalystACT
- CCJira Administrator - Western SydneyNSW
- FTSystems Administrator/Engineer | $60-90K package | ChatswoodNSW
- CCJava Developer - Front/ Back EndVIC
- CCiOS DeveloperNSW
- FTNetwork Systems LeadVIC
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia
- FTSystems Administrator/Engineer | Projects & BAU | Coastal Newcastle NSWWA
- CCEnterprise Systems Infrastructure SpecialistNSW
- CCAEM DeveloperNSW
- CCSenior Wintel EngineerNSW
- CCiOS Developer - New AppNSW
- CCData Stage DeveloperNSW
- CCSenior Information Security SpecialistNSW
- CCSenior Visual DesignerNSW
- CCSolution Architect_Microsoft ArchitectureACT
- CCApplication Support AnalystNSW
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsVIC
- CCSenior Test AnalystSA
- FTLead Software Developer- Complex Tax & Superannuation SolutionsNSW
- CCAD and FIM EngineerNSW
- CCImmediate iOS Developer Required - Contract - SydneyNSW
- FTNetwork Engineer | NV1 NV2 clearance | Defence projects | Immediate interviewACT
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Most enterprises plan to boost cloud use this year
- Google didn't abuse its position in Streetmap case, UK court rules
- GitHub apologizes for ignoring community concerns
- New Chromebook won't break with 365-pound person standing on it
- Nasdaq to use blockchain to record shareholder votes
- Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
- Intel SSDs may get speed, capacity boost with new Micron chips
- Five sue Apple over Error 53 and bricked iPhones
- AT&T to run field trials of 5G wireless in Austin this year
- Apple's iPhone sued for infringement of touch feedback patents
- Need data-science skills? Now your team can learn together
- Hackers of two Ukrainian utilities probably hit mining and railroad targets, too