Introduction The Shorter Oxford English Dictionary lists the 5th meaning of the word cipher as, “A secret manner of writing by any of various methods, intelligible only to those possessing the key ...
An end-to-end strategy must factor in all the ways the data can be input and output, as well as how it’s stored Here’s a sobering prediction: One-third of all adults in the United States will have ...
USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive ...
Though CenturionSoft’s CenturionMail 3.0 did not meet the criteria for our server-based testing, its software is quite good, so we’ve included a brief summary of what it offers. CenturionSoft was ...
Encryption is an obscure but critical part of everyday life. That padlock in the address bar of the website you’re visiting represents the ‘s’ after ‘http’ — which stands for the latest version of ...
Organizations are starting to take an interest in homomorphic encryption, which allows computation to be performed directly on encrypted data without requiring access to a secret key. While the ...
What do you do when you need to perform computations on large data sets while preserving their confidentiality? In other words, you would like to gather analytics, for example, on user data, without ...
Like with any industry, the information security industry, more commonly referred to as “cybersecurity,” for all its raging debates, has rallied around a small corpus of best practices. One of the ...