encryption
Security guidelines for PKI-based transactions
For all the infrastructure advantages and business benefits of PKI, recent breaches clearly indicate that the way in which PKI is implemented may not be as inherently secure …
Researchers crack SSL encryption
Two security researchers have found a way of breaking the SSL/TLS encryption that allows the information that passes from browser/user to server and back be reliable and, …
Micron SSD featuring self encryption
Micron Technology introduced a new version of its RealSSD C400, featuring self encryption. The C400 SED’s encryption capabilities are delivered through a hardware-based, …
Imation acquires IronKey’s security hardware business
Imation announced it will acquire the assets of IronKey’s secure data storage hardware business. The two companies also announced a strategic partnership whereby Imation …
Secure remote file access for Mac and PC
iTwin is a USB device that allows two online computers to share military-grade encrypted data from anywhere in the world. Comprising two identical parts, iTwin can be …
LockDown: USB 3.0 password protected HDD enclosure
Satechi introduced LockDown, a portable external SATA hard drive enclosure that not only keeps your data securely with a encrypted 256-bit AES hardware password protection but …
Is this the end of the line for DigiNotar?
DigiNotar is going down quickly and in flames. After having its SSL and EVSSL certificates deemed untrustworthy by the most popular browsers, around 4200 qualified …
Enterprise-level management and control of SSL certificates
Managing Secure Sockets Layer (SSL) certificates is critically important for enterprises and is becoming a larger challenge, especially due to the skyrocketing number of …
Secure hard drive replication for forensic analysis
Ciphertex Data Security announced its new Ranger-COP family (Ciphertex Optimized Protection), a compact pair of products that combine AES 256-bit hardware-based encryption …
Mozilla requests Firefox CAs to confirm they haven’t been compromised
As Google began notifying users that have been possibly affected by man-in-the-middle attacks through the use of the rogue SSL certificate issued by compromised CA DigiNotar, …
Email encryption for iPad and iPhone
Echoworx launched an on-the-device email encryption solution for iOS devices. mobilEncrypt ENDPOINT enables, iPhone and iPad users to send and receive secure, encrypted …
Log Management 10 comes with compliance enhancements
Ipswitch announced its log management software solution, WhatsUp Log Management 10 which provides out-of-the-box security and compliance for businesses of all sizes. The …