Your are here:hacking technology > encryption decipher > Article list

Simply encrypting data isn't enough, key management is vitalHits:1
Safety ofinformation and compliance often swim together in thecollective mind of CIOs, and therefore in the course of theadoption of security technologies to theinformation tends to be related to her?is that they solve the problems...2011-02-09
Personal alarm system powered by Bluetooth secures mobile phonesHits:1
Although most companies use passwords, encryption and policy processing device to prevent theunauthorized access to sensitive data, recent high-profile incidents of lost data demonstrate that these techniques alone are not infallible...2011-01-28
Comodo Disk Encryption now with Comodo's Endpoint Security ManagerHits:1
12,000 laptops are lost or stolen at U.S. airports each week, according to a study by thePonemon Institute. Manythem belong to travelersbusiness, including professionals in thecomputers are left to fear that the...2011-01-27
The future of securing company data is in the CloudHits:1
TheOne issue that is regularly aired in the discussions of cloud computing - the provision of content andfrom applications ofpart of the third data center - is that of security. ITis transformed into a broken record and there...2011-01-26
Proofpoint and Purewire partner to deliver SaaS email and web-based securityHits:1
Purewire and Proofpoint, providers of security services SaaS, today announced a go-to-market partnership and joint solution that will protect businesses against email and Web threats. Proofpoint provides comprehensive...2011-01-25
DeviceLock software for endpoint security reduces the risk of internal data breaches at Russian oilHits:1
JSC Gazprom Neft is theOne of theOil and fastest growing companies and gas production in Russia. The main activities of Gazprom Neft include oil and natural gas production, oil and gas field facilities, oil refining, and marketing of...2011-01-24
Voltage Security and Merchant Link partner to provide point-to-point encryption, cloud-based decryptHits:1
Voltage Security and Merchant Link has announced a partnership to provide point to point encryption, decryption of cloud spray and large commercial?ants in search ofa comprehensive security solution to protect data and reduce the scope PCI...2011-01-22
Domain validation certificates omit validating the legal existence of the applicantHits:1
On the Internet, SSL certificates are used as the basis for encryption algorithms. Internet browsers display a small yellow padlock 'sthey detect that the transmission is encrypted, regardless of whether the site has an...2011-01-21
New COO for CellcryptHits:1
David Rivington Cellcrypt appointed as Chief Operating Officer (COO) as the company positions itself for continued growth. David Cellcrypt comes with over 20 years ofinternational experience in management and strategy firms...2011-01-20
West Midlands Ambulance Service uses SafeStick and SafeConsole to protect portable dataHits:1
West Midlands Ambulance Service covers a geographical area ofabout 5,000 square miles and 5.3 million people living in Shropshire, Herefordshire, Worcestershire, Coventry, Warwickshire, Staffordshire and Birmingham and the Black Country....2011-01-19
EBS Building Society uses Check Point Media Encryption to secure confidential dataHits:4
With more than 430,000 members, EBS is theOne of the companies of theIreland's leading building. He wanted to secure confidential data on members of PCs and laptops used by its 600 employees, regulatory compliance andavoid the risk of harm...2011-01-18
Inhibiting employee use of Web 2.0 applications is a double edged swordHits:1
With strong evidence now ofemerge as theemployee access to Web 2.0 sites is beneficial, many organizations are beginning to reconsider their decision toban new Internet. However, without controlled?in place to...2011-01-17
Storing personal biometric data on a CIS database could spell disaster for the UK publicHits:1
Millions of British citizens identities?could be compromised if the British government is theahead with plans to store biometric data on the customer service ofinformation (CIS) database. John Barker, Managing Director, TSSI,...2011-01-15
Praxis appoints security business managerHits:1
Praxis has announced the appointment ofAndrew Proctor Security Business Manager. Andrew will be responsible for responding to customer needs in the security sector. Praxis has recognized the growing demand for ultra low defect software and...2011-01-14
Comodo to Exhibit Enterprise Cybersecurity Solutions at SC World CongressHits:1
Last week, Comodo Group presents its landscapes produced during SC World Congress, a trade show for professionals in technology 'Information in New York. Comodo products on display included Comodo Endpoint Security Manager, which now...2011-01-13

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:3 , Total 33 Pages, Every Page 15 Records, Total Records: 491

Hot Articles
Recommend Articles
New Articles
Sub category