Encryption

B742830daed9314883a0edc63daefc42

NSA vs. Cloud Encryption: Which is Stronger?

April 12, 2014 Added by:Gilad Parann-Nissany

The NSA is powerful: they watch, they listen, they collect data. In cases of national security, perhaps this is a good method to catch terrorists. In cases of private business data, there is a way to block the NSA from getting to your sensitive information: strong data encryption.

Comments  (0)

B742830daed9314883a0edc63daefc42

Pros and Cons of US-Based Cloud Services

March 31, 2014 Added by:Gilad Parann-Nissany

Any company or individual using cloud services today should encrypt data in addition to their firewall, anti-virus and other security measures. Incidentally, it is also encouraged by regulation in several sensitive sectors, notably businesses in the health industry under HIPAA patient and data privacy laws and the payment card industry under PCI DSS standards.

Comments  (0)

76e662e7786bf88946bd6c010c03ac65

We Have to Find Ways to Reinforce Trust

March 29, 2014 Added by:Jarno Limnéll

We are losing the battle for cyberspace. Not because malicious actors are taking over the digital world, but because we are forgetting what is the element that makes us feel safe and secure in any world: the ability to trust.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

BYOD For Government?

March 23, 2014 Added by:Cam Roberson

BYOD is fast becoming the norm for many enterprises, despite the security risks. Government agencies have been slower to adopt, but will need to start implementing policies that address BYOD.

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

Making the Mobile Web Safer with HTTPS Everywhere

February 04, 2014 Added by:Electronic Frontier Foundation

As of today, you can install HTTPS Everywhere on Firefox for Android(until now, it could only protect desktop browsers).

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Encryption: The Key to Network Security

December 05, 2013 Added by:Patrick Oliver Graf

The newly released Encrypt the Web report by the Electronic Frontier Foundation (EFF) illustrates that even large, well-known enterprises are susceptible to lapses in properly securing network communications.

Comments  (0)

52a995fead03e1d828980d4b3efd2719

What the Snowden Leaks Can Teach Us About Data Security

November 14, 2013 Added by:Cam Roberson

One of the major issues discussed in the wake of the National Security Agency leak involving Edward Snowden was how the government can prevent a similar leak from happening in the future. This article looks at several specific measures that can strengthen data security, making it more difficult for bad actors to break into the system, and tougher for them to make off with sensitive information onc...

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (1)

F66c1a87a8db2cb584b4e06e93a84ce3

'Number Machine' as a Service

November 08, 2013 Added by:Mikko Jakonen

This is a overview for system build by man whom needed to test some functionality on SDR (Software Defined Radio) and its potential to “snatch” data over-the-air (OTA) on strictly defined use-case scenario. That is separate stuff. This article concentrates on searching the origin.

Comments  (0)

3071bd3c5c013c8c3defcccad0259c16

Encrypting Data At Rest Or In The Cloud: Is It Value Adding?

October 16, 2013 Added by:Hani Banayoti

Consider encryption at rest but make informed decisions about its value and protection afforded.

Comments  (2)

C4363f41d25c216c53c8d71a1ac44a90

Dutch Government Response to Revelations by Edward Snowden

September 15, 2013 Added by:Matthijs R. Koot

On September 13th 2013, the Dutch government responded (.pdf, in Dutch) to the revelations by Edward Snowden. Unfortunately, that response is currently only available in Dutch. I decided to translate it to English.

Comments  (2)

E595c1d49bf4a26f8e14ce59812af80e

Why Elliptic Curve Cryptography is Necessary for Secure Remote Access

August 26, 2013 Added by:Patrick Oliver Graf

Experts warn that within the next several years, the RSA public key cryptography system could even potentially become obsolete. If that is the case, how will enterprises be able to ensure secure remote access in the near-future?

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

PKI for Authenticating Remote Access VPNs: How Government Agencies Ensure Secure Communications

August 02, 2013 Added by:Patrick Oliver Graf

With many documents critical to matters of national security being accessed on a daily basis, government agencies must ensure that all users trying to establish connections of any type to their networks are who they say they are, that they are authorized to access locations that they are connecting to and that all communications are encrypted.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Social Engineering – A True Case Study

August 01, 2013 Added by:Jon Stout

There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.

Comments  (2)

8a958994958cdf24f0dc051edfe29462

Cyber Attacks the Reality, the Reason and the Resolution Part 3

June 24, 2013 Added by:Larry Karisny

Knowing the reality and reasons behind cyberattacks, it’s time to stop talking and start offering resolution to these serious problems. There is no "it won’t happen to me" anymore. We must immediately deploy prevention and detection technologies to our critical processes or frankly, we could lose it all.

Comments  (0)

5c549756b3c0b3d5c743158a72ce3809

Do You Have a Vendor Security Check List? You Should!

May 09, 2013 Added by:Michael Fornal

A security check list is a list of security controls that a vendor or application must meet. These controls can range from how storage back up is to be done, to password complexity requirements. Having a checklist can help you in deciding if the application or vendor conforms to your company’s security requirements.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked