Encryption techniques News

View All News

Encryption techniques Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Encryption techniques Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • How bring your own encryption in the cloud works for enterprises

    Bring your own encryption offerings for the cloud are more common now. Expert Ed Moyle discusses the benefits and drawback of BYOE and what to know before implementation. Continue Reading

  • Identity of things moves beyond manufacturing

    With more employees bringing their own devices and network-connected objects -- such as keycard controls and energy monitoring systems -- the digital footprint of the internet of things is only increasing. Yet the security industry is starting to develop an identity of things strategy.

    Manufacturing, healthcare and critical-infrastructure companies have long dealt with the identity of things. Supervisory control and data acquisition engineers may be able to teach CIOs and CISOs the best way to handle device identity management. Determining which devices should access a network is a daunting task, however, because device identity management can be context dependent. Some, such as mobile phones, should be linked to users; others, such as radio frequency ID tags on cargo containers, should be linked to physical objects; and still others, such as an MRI machine or a centrifuge, need to be treated as a critical asset. To deal with the influx of devices and the identity of things, companies need to address discovery, asset identification and provisioning.

    As the U.S. presidential election nears, we caught up with Nathaniel Gleicher, the former director of cybersecurity policy at the National Security Council in the White House. Gleicher, who is currently the head of Illumio's cybersecurity strategy, spoke with Information Security magazine about the Shadow Brokers' cyberweapons dump, the importance of having visibility into networks that need to be protected and the challenges of the vulnerabilities equities process.

     Continue Reading

  • Carbonite vs. Mozy: What you need to know for cloud backup

    Cloud backup vendors Carbonite and Mozy vary in their levels of support, pricing, mobile access, security and local backups, as well as target customer base. Continue Reading

View All Evaluate

Manage Encryption techniques

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Encryption techniques Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve