truecrypt.jpgEveryone in the security sector seems to be worried about endpoint security, including Symantec. I was at one of their events a few months ago where an executive held up a pen drive and warned about the amount of data that could get left behind. This tutorial offers some practical advice on how to use a tool called TrueCrypt to lock down such devices before they fall into the wrong hands. Pretty useful.



Related Download
IBM Reference Architecture for Genomics Sponsor: IBM
IBM Reference Architecture for Genomics

Register Now
Uncategorized