48 Results for:PGP
- Sort by:
Government backdoor security concerns prompt letter to president
22 May 2015As privacy and security concerns rise, President Obama is urged to dismiss the call for government backdoors. Read More
What are the export limitations for AES data encryption?
25 Aug 2009Although AES is free for any use public or private, commercial or non-commercial programs that provide encryption capabilities are subject to U.S. export controls. Expert Michael Cobb reviews the limitations. Read More
Black Hat Las Vegas 2007: Special news coverage
22 Jul 2007SearchSecurity.com covers all the controversy at this year's show with news, features, podcasts, interviews, exploits and more direct from Las Vegas. Read More
Key management challenges and best practices
24 Jul 2008Key management is essential to a successful encryption project. In this tip, expert Randy Nash explains the challenges financial organizations face when implementing key management and some of the best practices to... Read More
Securing removable drives with BitLocker To Go
27 Jan 2010BitLocker To Go, which ships with Windows 7 Ultimate and Enterprise Editions, can help secure FireWire and USB drives — but is it right for your business? Read More
How can header information track down an email spoofer?
02 May 2007Spammers can use spoofed headers to hide the true origin of unwanted email. In this SearchSecurity.com Q&A, application security expert Michael Cobb explains how to trust where a message is coming from. Read More
IETF approves new weapon to fight spam, phish
24 May 2007DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks. Read More
Raising risk prospects with a new SQL injection threat
02 Aug 2005"Inference attacks" could deliver up your so-called secure database to an attacker. Read More
Survey: Data breach costs surge
30 Oct 2006A new study by the Ponemon Institute finds a 31% increase in the costs associated with a data breach. Read More