Cities and counties are responsible for a great deal of sensitive information, from police officers' home addresses and citizens' credit card and banking information to medical data and more. In a ...
In the digital world, cryptographic keys are crucial assets in the COMSEC realm, transforming unencrypted data into an ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
Virtustream, an infrastructure-as-a-service (IaaS) provider focused on the enterprise, says the key to meeting demand for encryption in cloud services is to offer lots of options. Virtustream, a ...
BEDFORD, Mass., May 6/PRNewswire/ --RSA, The Security Division of EMC (NYSE: EMC) today announced enhancements to RSA(R) Key Manager Suite (RKM), its enterprise encryption key management system ...
In response to dramatic and widely-publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the ...
Designed to provide the rigor and security required for the most sensitive transactions, hardware security modules (HSMs) are widely used by financial services, enterprises, and government entities, ...
Box announced a new product today called Box KeySafe that should help simplify encryption key management, putting it in reach of small to medium sized businesses (SMBs) who require encryption, but ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Enterprises are using encryption in more places than ever, ...
ANNAPOLIS, Md.--(BUSINESS WIRE)--The Accredited Standards Committee X9 Inc. (X9) today announced the publication of an update to its X9.69 standard, Framework For Key Management Extensions. This ...
Open source project GPG Sync makes it easier for organizations already using GPG to encrypt email messages to manage different user keys In all the discussion about using encryption, a critical point ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results