Update, Feb. 5, 2015, 8:10 p.m.: After this article appeared, Werner Koch informed us that last week he was awarded a one-time grant of $60,000 from Linux Foundation’s Core Infrastructure Initiative.
Department of Veterans Affairs Secretary R. James Nicholson Monday has announced that all VA computers throughout the agency will be upgraded with enhanced data security encryption systems beginning ...
PCI DSS and Data Encryption For starters, encryption should be seen as a fundamental element of an organization’s risk management program. While technologies such as firewalls and IDS/IPS are de ...
A popular open-source program for encrypted communications has a serious flaw that could let Internet attackers slip into servers running the software, said its creators and a security company this ...
However, other components which can be optionally added to improve security include Drive Encryption, Endpoint Encryption Removable Storage, Gateway Email Encryption, Desktop Email Encryption, File ...
Open-source legend TrueCrypt may be gone, but the usefulness of full disk encryption carries on. So what’s a crypto fan to do now for their encryption needs? The first phase of the TrueCrypt audit ...
In the wake of the Paris terror attacks, some politicians and intelligence officials began rallying for "back doors" into encrypted messaging apps. On Wednesday, FBI ...
U.S. government agencies are scrambling to plug one of their biggest security holes: sensitive information — names, addresses and Social Security numbers, for example — stored on laptops, handhelds, ...
It’s just impossible to ban. There is no way to define a law which constrains the use of encryption. Would it be only when used in certain applications (such as email), or by disallowing certain ...
If you want something done right, do it yourself. That may sound trite, but it rings true as advice for securing files that you’ve stored online. Several recent incidents—including breaches of Dropbox ...