Let’s be honest for a moment: when it comes to cyber security habits, companies aren’t typically interested in investing the proper time, resources and infrastructure changes necessary to properly ...
Data storage security covers a wide landscape, including legal compliance, e-discovery, user access control and the physical security of data storage media. In this article we will focus on ...
There was a time, not all that long ago, when a fully-encrypted system disk was something only for people with money to burn. You bought a special disk controller which performed hardware-based ...
Encryption is an interesting thing. The first time I saw encryption in action was on a friend’s Gentoo Linux laptop that could only boot if the USB key with the boot partition and decryption key was ...
Full disk encryption is the most commonly used encryption strategy in practice today for data at rest, but does that mean it’s sufficient to prevent unauthorized access to your data? The short answer: ...
Check Point Full Disk Encryption vs. Trend Micro Endpoint Encryption Your email has been sent Cybersecurity powerhouses Check Point and Trend Micro offer good encryption options, but which one reigns ...
In last week’s newsletter, security expert Sean Steele of infoLock Technologies gave some pointers of what to look for when you are choosing a full disk encryption solution for your company. This week ...
Like with any industry, the information security industry, more commonly referred to as “cybersecurity,” for all its raging debates, has rallied around a small corpus of best practices. One of the ...
A new ransomware strain is implementing a troubling but so far relatively rarely used technique to encrypt data in a target environment. Instead of encrypting files on endpoint systems like most ...