encryption - News, Features, and Slideshows
A file-encrypting ransomware program called CryptoWall infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than US$1 million, researchers found.
By Lucian Constantin | 29 August, 2014 22:24
Technology development firm Allied Minds says it has set up a new company, Whitewood Encryption Systems, to develop quantum-crypto technology under an R&D licensing arrangement with Los Alamos National Laboratory.
By Ellen Messmer | 29 August, 2014 00:27
Facebook has moved to beef up its servers by agreeing to buy cybersecurity startup PrivateCore.
By Sharon Gaudin | 08 August, 2014 06:06
Managing the keys of all your valuable resources, be they in the real world or the virtual, can be a hassle. Managing all the encryption keys for an entire enterprise is a harder challenge still.
By Joab Jackson | 08 August, 2014 02:50
Websites that aren't encrypting connections with their visitors may get a lower ranking on Google's search engine, a step the company said it is taking to promote better online security practices.
By Jeremy Kirk | 07 August, 2014 16:30
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
Whitepapers about encryption
As organizations begin to expand their encryption usage, several realities become readily apparent: Encryption, The increasing adoption of cloud services, and leveraging hardware security modules (HSM) as well as standards will become foundational requirements for central, enterprise-wide key management. How are organisations contending with these realities as they seek to meet the need for more widespread encryption? This executive summary draws on an extensive survey to provide an update.
UXC Connect’s Jesmond Psaila says that DevOps can do for IT operations what Agile did for software development. This paper demonstrates how, by combining both approaches, you can significantly improve operational efficiency and time-to-market. • Marketing and development teams want to constantly change or increase functionality, while IT operations teams want to keep the environment as stable as possible • Agile software development and virtualisation have not solved the time-to-value problem faced by marketing and IT operations teams • Recent movements in DevOps aim to address and redefine a more agile service management platform, while new tools have vastly improved functionality to configure and automate common processes
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTSenior Media TraderNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTChief Information OfficerNSW
In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.
- Healthdirect Australia sees value in open source for security solution
- Namecheap says accounts compromised in hacking incident
- Why hackers may be stealing your credit card numbers for years
- Quickflix suffers $10m loss
- Web Marketing Experts to create 115 new jobs in Melbourne
- Comms Alliance backs website blocking in piracy fight
- Reconnaissance code on industrial software site points to watering hole attack
- China orders Microsoft to explain Windows, Office practices within 20 days
- Europol launches international cybercrime task force
- Show spotlight will be on smartwatches with better looks and connectivity
- China gives Microsoft 20 days to answer questions in anti-monopoly probe
- Happy Labor Day -- will a bot take your help desk job?
- European 700MHz band should be freed for mobile broadband by 2020, report says
- Bill shock measures extended to all telcos
- Warrantless requests for customer data dominate in Telstra Transparency Report