Just because you have antivirus software installed on your PC doesn't mean a zero-day Trojan can't steal your personal data.
It's a valuable addition for organizations with compliance or privacy concerns, but to use the feature, customers must ...
USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive ...
BitLocker is the most common way to encrypt your Windows PC to protect it against data theft in the event that someone steals your PC, but it isn't the only option. If your PC doesn't have BitLocker ...
Sun is offering to give away its encryption key management software interface for nothing. Customers with devices that encrypt data will be able to interoperate with a Sun key management system freely ...
Google has introduced an important update to Gmail by bringing end-to-end encryption (E2EE) to mobile devices.
Google’s move to bring end-to-end encryption to mobile Gmail closes a critical enterprise workflow gap while reinforcing a growing divide between premium compliance features and baseline user security ...
Taking the time to review network encryption settings other than those in BitLocker needs much more review and examination to ensure thorough and consistent security. When we think about encryption ...