encryption
Unencrypted payment data on business networks at 70%
SecurityMetrics published its second annual Payment Card Threat Report revealing unencrypted PAN (Primary Account Number) storage remains alarmingly high. Virtually no change …
Entrust solves SSL compliance challenges
Finding, managing and analyzing SSL and other digital certificates can be time-consuming, complex and expensive. To help automate and simplify these tasks, Entrust introduces …
Imation releases PC on a Stick mobile workspace
Imation announced beta availability of its IronKey Workspace, certified for deployment of Windows To Go. The IronKey Workspace lets organisations outfit mobile professionals …
Linux file encryption with BestCrypt
Jetico has announced BestCrypt Container Encryption for Linux 2.0, now with a simple user experience in a new GUI, plus greater stability and security. Features and benefits …
FileLocker: Secure cloud collaboration
FileLocker protects data by encrypting it locally, in-transit and again in the cloud. This means the file is stored with two layers of encryption – one controlled by …
Secure email app for iOS and Android
AppRiver launched the CipherPost Pro app, which lets companies extend AppRiver’s cloud-based encryption service to any iOS or Android device. CipherPost Pro allows users …
Security system for trust of data in the cloud
Porticor introduced the latest release of its Virtual Private Data (VPD) system, which protects cloud data while stored and in use, delivering total security to cloud …
Weak crypto allowed spoofing emails from Google, PayPal domains
Zach Harris, a Florida-based mathematician, discovered that Google and many other big Internet companies use weak cryptographic keys for certifying the emails sent from their …
Popular Android apps leaking passwords due to poor SSL
A group of researchers from two German universities claim that eight percent of the 13,500 popular, free-of-charge, legitimate Android Android apps they downloaded from Google …
Thales releases elliptic curve hardware security modules
Thales introduced of nShield Connect 6000+ and nShield Solo 6000+ hardware security modules (HSMs), delivering the fastest available support for elliptic curve cryptography …
Cloud security application uses electronic fingerprint
Intrinsic-ID launched Saturnus, an application that allows users to protect data with their mobile devices before sending it to the cloud. It is the first application that …
Cloud-based document security from SealPath
SealPath launched its cloud-based software solution for Professionals and Enterprise users. Using SealPath technology, documents containing sensitive business information are …
Featured news
Resources
Don't miss
- Man vs. machine: Striking the perfect balance in threat intelligence
- Misconfig Mapper: Open-source tool to uncover security misconfigurations
- Why AI deployment requires a new level of governance
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests