Please turn on your JavaScript for this page to function normally.
Security guidelines for PKI-based transactions

For all the infrastructure advantages and business benefits of PKI, recent breaches clearly indicate that the way in which PKI is implemented may not be as inherently secure …

Researchers crack SSL encryption

Two security researchers have found a way of breaking the SSL/TLS encryption that allows the information that passes from browser/user to server and back be reliable and, …

Micron SSD featuring self encryption

Micron Technology introduced a new version of its RealSSD C400, featuring self encryption. The C400 SED’s encryption capabilities are delivered through a hardware-based, …

Imation acquires IronKey’s security hardware business

Imation announced it will acquire the assets of IronKey’s secure data storage hardware business. The two companies also announced a strategic partnership whereby Imation …

Secure remote file access for Mac and PC

iTwin is a USB device that allows two online computers to share military-grade encrypted data from anywhere in the world. Comprising two identical parts, iTwin can be …

LockDown: USB 3.0 password protected HDD enclosure

Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …

Is this the end of the line for DigiNotar?

DigiNotar is going down quickly and in flames. After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, around 4200 qualified …

Enterprise-level management and control of SSL certificates

Managing Secure Sockets Layer (SSL) certificates is critically important for enterprises and is becoming a larger challenge, especially due to the skyrocketing number of …

Secure hard drive replication for forensic analysis

Ciphertex Data Security announced its new Ranger-COP family (Ciphertex Optimized Protection), a compact pair of products that combine AES 256-bit hardware-based encryption …

Mozilla requests Firefox CAs to confirm they haven’t been compromised

As Google began notifying users that have been possibly affected by man-in-the-middle attacks through the use of the rogue SSL certificate issued by compromised CA DigiNotar, …

Email encryption for iPad and iPhone

Echoworx launched an on-the-device email encryption solution for iOS devices. mobilEncrypt ENDPOINT enables, iPhone and iPad users to send and receive secure, encrypted …

Log Management 10 comes with compliance enhancements

Ipswitch announced its log management software solution, WhatsUp Log Management 10 which provides out-of-the-box security and compliance for businesses of all sizes. The …

Don't miss

Cybersecurity news