Encryption
Never Really Gone: How to Protect Deleted Data From Hackers
Deleting data doesn’t necessarily mean that it’s permanently gone. Here are some methods for keeping your private data out of the wrong...
Debunking the Top 5 Blockchain Myths
Like all new technologies, it can be difficult to separate fact from fiction in the case of blockchain. Here we examine some of...
How Retailers Can Safeguard Against Holiday Hackers
As the holidays approach and shoppers shift into high gear, so do hackers. Protect yourself and your business against data breaches so that...
10 Best Practices for Encryption Key Management and Data Security
Data security is more important than ever, and encryption is one of the primary methods of securing data. Here we discuss some best...
Can Public Key Infrastructure Provide More Security Online?
So just how safe is your data? Here we take a deeper look at the PKI technology designed to protect it.
The Cyber War Against Terrorism
The battlefield no longer has to be a physical space - war is now taking place in cyberspace. White hat and grey hat hackers combat...
The Persistence of Digital Rights Management
From the day that digital rights management was implemented, there have been entities determined to find ways around it. Is DRM worth the...
Trusting Encryption Just Got a Lot Harder
Edward Snowden's revelations of government access to personal data has cast suspicion on just how secure "encrypted" data really is. Can...
Google's End-to-End Encryption Isn't What It Seems
Google tries to make end-to-end email encryption simple to use. It will be, but there are caveats. Learn more about it here.
Encryption Just Isn't Enough: 3 Critical Truths About Data Security
Once data has been disseminated from its originator, keeping it secure can be quite a challenge. Here we discuss some strategies for...