encryption - News, Features, and Slideshows
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
By Lucian Constantin | 31 July, 2015 06:29
A group of suspected Russian hackers are using Twitter in a clever way to mask their data-stealing malware, according to computer security firm FireEye.
By Jeremy Kirk | 29 July, 2015 20:09
There's an old saying in the security community: Attacks always get better. The latest case where that holds true is for the aging RC4 cipher that's still widely used to encrypt communications on the Internet.
By Lucian Constantin | 17 July, 2015 00:38
A flaw in the widely used OpenSSL library could allow man-in-the-middle attackers to impersonate HTTPS servers and snoop on encrypted traffic. Most browsers are not affected, but other applications and embedded devices could be.
By Lucian Constantin | 10 July, 2015 01:39
U.S. Secretary of Defense Ash Carter will renew his appeal to businesses to work more closely with the military on Thursday when he speaks to an audience of top executives at the Sun Valley conference in Idaho.
By Martyn Williams | 09 July, 2015 08:02
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
By Ian Harac | 09 March, 2011 06:09
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information.
By Tony Bradley | 11 November, 2010 07:42
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
By James E. Gaskin | 14 May, 2009 04:34
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
The government's insistence, in its dispute with Lavabit, that cloud service providers hand over their encryption keys when asked, has refocused attention on the issue of key ownership and management in the cloud.
By Jaikumar Vijayan | 15 November, 2013 11:41
An encryption initiative runs into the law of unintended consequences, since the legal department can't search encrypted emails for e-discovery purposes.
By Mathias Thurman | 14 January, 2013 11:04
Whitepapers about encryption
As organizations begin to expand their encryption usage, several realities become readily apparent: Encryption, The increasing adoption of cloud services, and leveraging hardware security modules (HSM) as well as standards will become foundational requirements for central, enterprise-wide key management. How are organisations contending with these realities as they seek to meet the need for more widespread encryption? This executive summary draws on an extensive survey to provide an update.
Research shows that 94% of CIOs believe that enterprise mobility has become an important part of their enterprise IT strategy. While there are many benefits for business, there are still risks when it comes to security. This whitepaper looks at the steps all organisations to take when it comes to supporting a mobile workforce.
- FTMid level IT consultant | Systems Integration & Managed ServicesNSW
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTManual Test Engineer | Financial Institution | Web testingNSW
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTLevel 2 IT Support TechnicianVIC
- FTAndroid DeveloperNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FTSystems Administrator - Managed ServicesNSW
- FTLinux Administrator with AWS & DevopsNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTField EngineerNSW
Cloud, identity management and enterprise mobility technologies can provide significant benefits for business efficiency and promote a cohesive workforce. However, it can often result in conflicts of interests between business heads and IT leaders, both who have different concerns and expectations on how these solutions should benefit the company. <p> This whitepaper looks at how a balanced approach can benefit both IT and business stakeholders with result in increased business flexibility and security. Included in this white paper are also 5 real world examples where organisations are able to reap the benefits of these platforms by adopting synergistic strategies.
- Google, WhatsApp integration lets users back up messages on Android
- Arista stock up on review of Cisco patent claims
- New service helps pull data into AWS from the Internet of Things
- Zendesk tool taps machine learning to nip customer-service problems in the bud
- Amazon launches QuickSight business intelligence service
- Microsoft expands FastTrack service to aid Office 365 migration for businesses
- Microsoft claims 110M devices now run Windows 10
- Greens call for Trans-Pacific Partnership assessment
- Verizon will use its mobile supercookie to target customers with AOL ads
- 8 tech startups ink $400K in new contracts
- EU Safe Harbor ruling could have bearing on Microsoft email dispute
- IPsoft's 'Amelia' virtual assistant just got a whole lot more human
- Clothing retailer Uniqlo uses brain waves to match customers with t-shirts
- With Safe Harbor gone, the hard work on data transfers starts now
- Meet Project Orca, SAP's new, Hana-based analytics tool