RSA 2014 roundup: New products from Sophos, iBoss and viaForensics

The annual RSA Conference provides an opportunity for security vendors to steal some of the spotlight from the host and reveal new products or updates to existing ones. Among those who made announcements

Share on LinkedIn Share with Google+ Comment on this article Published on: February 28th, 2014 Howard Solomon

Biggest breaches of 2013: Lessons we haven’t learned

SC Magazine – sponsors of the popular SC Congress series of conferences – released it list of the Top 8 Security Breaches of 2013 recently, and the dispiriting thing is, the themes are

Share on LinkedIn Share with Google+ Comment on this article Published on: December 16th, 2013 Dave Webb

Secure Android handset still a go despite Indiegogo failure

While there’s a lot to like about the Android platform in principle, there have been a few security exploits that have left some people a bit concerned about letting this smartphone leader into

Share on LinkedIn Share with Google+ Comment on this article Published on: October 21st, 2013 Sean Carruthers

Data still safer with encryption: Experts

American intelligence operatives may be colluding with technology companies and using backdoors and brute force attacks to crack encryption technologies, but encryption is still the best way to protect the privacy of online

Share on LinkedIn Share with Google+ Comment on this article Published on: September 9th, 2013 Nestor E. Arellano

US, British spy agencies cracked Web encryption

Top secret documents revealed by former United States National Security Agency contractor, Edward Snowden indicate that American and British intelligence agencies have cracked much of the online encryption which is supposed to protect

Share on LinkedIn Share with Google+ Comment on this article Published on: September 6th, 2013 Nestor E. Arellano

Five Ways to Ensure Encryption is More Effective and Manageable

Encrypting data on laptops, notebooks and tablet computers is now widely accepted as a best practice for any organization. Indeed, it is an obligation for most industries that have any form of regulatory

Share on LinkedIn Share with Google+ Comment on this article Published on: August 20th, 2013 Jeff

Keeping data here no protection against US: Lawyer

The refusal of some federal government departments to allow outsourcers to store personal data of citizens outside Canada won’t keep foreign governments from getting legal access to it, says a lawyer who specializes

Share on LinkedIn Share with Google+ Comment on this article Published on: December 19th, 2012 Howard Solomon

Encrypting data in the cloud

Image courtesy of Shutterstock We're in the midst of analyzing some survey data for an upcoming report on cloud computing strategy and have discovered that, thus far into the cloud computing era, security is

Share on LinkedIn Share with Google+ Comment on this article Published on: December 5th, 2012 Dave Webb

Unwrapping encryption trends

FRAMINGHAM, Mass. --  Encryption is hot. Perhaps that's because its been around so long it's no longer seen as a black art. Or perhaps security issues have grown so prevalent, everyone wants some

Share on LinkedIn Share with Google+ Comment on this article Published on: September 28th, 2010 Michael Cooney