A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Encryption vendor Virtru launched a news service on Nov. 30 that enables its customers to keep encryption keys for cloud email services in an on-premises key server. The new Customer Key Server (CKS) ...
Using SSH and encrypting your data are the biggest steps organizations can take to ensure that all their private information remains safe and secure and away from prying eyes. However, there are ...
Eruces Data Security has secured a patent for its three-step encryption and key management scheme, which is designed to lock down data through its lifecycle. The security firm’s so-called Tricryption ...
One of the oldest still-working protocols on the Internet is FTP (File Transfer Protocol). Designed in the net’s earliest days, FTP never concerned itself with security. Later standards addressed this ...
Ars recently attempted to delve into the inner workings of the security built into Apple’s iCloud service. Though we came away reasonably certain that iCloud uses industry best practices that Apple ...
Hard drive encryption is nothing but the organized corruption of data. The technology hit the spotlight in 2006 when the infamous VA laptop was stolen which contained personally identifiable ...
The U.S. government has attempted to obtain the master encryption keys that Internet companies use to shield millions of users' private Web communications from eavesdropping. These demands for master ...
Encryption is pushing its way into more corners of the enterprise. From database fields for customer credit cards or social security numbers, to laptop hard drives with proprietary data, more storage ...