The growth of the bring-your-own-device (BYOD) trend, in which employees use their personal devices in the workplace, is proving to be a huge headache for IT. Often underfunded, understaffed and ...
Data loss is bad enough, but having that data fall into someone else's hands -- especially if they happen to be the wrong hands -- can be disastrous. While in an ideal we shouldn't be losing data in ...
According to security vendor Symantec, 48% of enterprises increased their use of encryption over the past two years. This sharp increase mirrors the increase in data migration to the cloud. If your ...
Technological advances are making adoption of network and data encryption more practical than ever, spurring its use in enterprises. Sixty-six percent of respondents to aPonemon Institute survey said ...
Encryption is like phone networks, or railways, or plumbing—it’s a huge part of our daily lives that we very seldom think about. Encryption protects the most personal information we share online in ...
Last week I published two research reports on the hottest topic in PCI: Tokenization and Transaction Encryption. Part 1 was an introduction into the topic and Part 2 provided some action items for ...
I once had the pleasure of visiting merry old London, England, attending the InfoSecurity Europe conference. About 12,000 people from all around the globe showed up for the 3-day affair and, as you ...
Is your enterprise looking at increasing its use of data encryption? Check out these best practices before setting your enterprise strategy. In last week’s article, I covered four basic best practices ...
This is Null Byte's fourth part in a series about fully securing our computers (Part 1, Part 2, Part 3). In our last Null Byte, we went over how to encrypt an entire operating system to protect our ...
Encrypting your PC is one thing, but how do you keep it backed up? And how do you maintain easy access to the files if you work on several computers at different times? One author I know has two ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果