encryption
Toshiba announces new self-encrypting drive
Toshiba announced a 7,200 RPM 2.5-inch Self-Encrypting Drive (SED) that provides government-grade AES-256 hardware encryption incorporated in the disk drive’s controller …
Trend Micro acquires Mobile Armor
Trend Micro purchased data protection specialist Mobile Armor. Financial terms are not disclosed. The transaction, which is subject to certain closing conditions, including …
Cloud-based crack of SHA-1 passwords is a taste of things to come
Reports that a German hacker has successfully cracked a secure hashing algorithm (SHA-1) password using a pay-as-you-use cloud computing based parallel processing environment …
Vast majority of organizations continue to adopt encryption
For the first time regulatory compliance has surpassed data breach mitigation as the top reason why organizations deploy encryption technologies, according to Ponemon …
Dell releases endpoint encryption solution
Dell today announced Data Protection | Encryption, a flexible, manageable and auditable endpoint encryption solution. The solution is designed to help companies protect …
Hotmail gets full-session HTTPS
Firesheep‘s developers can be satisfied. Not only has Microsoft started contemplating SSL for Bing but – as of yesterday – has provided its Hotmail users …
Mismanaged data encryption causes financial loss
Venafi invited the 150-plus survey participants from the world’s largest companies to give their views on the problem of downtime caused by increasing encryption …
Firesheep countermeasure tool BlackSheep
Firesheep is the Firefox extension that makes it easier to steal logins and take over social media and email accounts after users log in from a WiFi hotspot or even their own …
Popular online services graded on SSL implementation
It seems that Firesheep has succeeded where similar tools have failed in the past: the issue of full end-to-end encryption for all websites – especially the most popular …
End-to-end data security
RSA announced its RSA Data Protection Manager product which combines tokenization and application encryption, two popular application-based controls, with advanced token and …
Protect login credentials with key stroke encryption
SutiSoft released SutiKSE, a security solution that protects data being entered on the keyboard. The solution helps protect against keylogging software and malware threats …
RAID tower with hardware encryption
Addonics announced a family of Cipher Raid Towers with AES 256-bit full disk hardware encryption, a solution for applications that require reliable storage with redundancy and …