Department of Veterans Affairs Secretary R. James Nicholson Monday has announced that all VA computers throughout the agency will be upgraded with enhanced data security encryption systems beginning ...
Ever since former National Security Agency consultant Edward Snowden revealed mass governmental surveillance, my inbox has been barraged with announcements about new encryption tools to keep people's ...
Update, Feb. 5, 2015, 8:10 p.m.: After this article appeared, Werner Koch informed us that last week he was awarded a one-time grant of $60,000 from Linux Foundation’s Core Infrastructure Initiative.
Two things jump to mind when it comes to encryption: It's a must-have for secure military installations, and it's a huge headache to implement among everyone else. Encryption's reputation as a ...
The most aggressive users of encryption for PCs, databases, and networks can spend hundreds of thousands of dollars on product licenses, training, and support. The added software and hardware layers ...
Encryption is never out of the spotlight in this industry, but the methods that businesses can deploy to encrypt their data are wide-ranging. Daniel Brecht examines the pros and cons of the various ...
A discreetly tucked-away folder that contains your résumé, your tax returns, and other important files may be convenient for you, but it’s also a gold mine for online crooks who steal and sell digital ...
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. Encryption was already used by ...
A new call for limits on encryption technology is finding weak political support in the United States, despite a looming clandestine war against terrorism that is likely to hinge on the effectiveness ...
America Online released on Monday an updated version of its AOL Instant Messenger service that offers client-to-client encryption. AOL is partnering with VeriSign to provide the feature in AIM 5.2, as ...
Open-source legend TrueCrypt may be gone, but the usefulness of full disk encryption carries on. So what’s a crypto fan to do now for their encryption needs? The first phase of the TrueCrypt audit ...
This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated. Ever since former National Security Agency ...