The growth of the bring-your-own-device (BYOD) trend, in which employees use their personal devices in the workplace, is proving to be a huge headache for IT. Often underfunded, understaffed and ...
According to security vendor Symantec, 48% of enterprises increased their use of encryption over the past two years. This sharp increase mirrors the increase in data migration to the cloud. If your ...
Data loss is bad enough, but having that data fall into someone else's hands -- especially if they happen to be the wrong hands -- can be disastrous. While in an ideal we shouldn't be losing data in ...
Technological advances are making adoption of network and data encryption more practical than ever, spurring its use in enterprises. Sixty-six percent of respondents to aPonemon Institute survey said ...
The past year has seen significant developments in encryption technology, policy and legal cases. With a new presidential administration and Congress, it s timely to consider the current state of ...
Policies, processes and a "corporate ethos" of care of data are more important in securing sensitive information than using encryption technology. Encryption has been back in the spotlight following ...
Most of the attention on Windows 8.1 Preview emphasizes the many interface changes and new features. In the background, Windows 8.1 also offers a number of security enhancements that will help keep ...
This is Null Byte's fourth part in a series about fully securing our computers (Part 1, Part 2, Part 3). In our last Null Byte, we went over how to encrypt an entire operating system to protect our ...
Is your enterprise looking at increasing its use of data encryption? Check out these best practices before setting your enterprise strategy. In last week’s article, I covered four basic best practices ...
Mozilla versions, and the wrong one will fail with a mysterious and unhelpful error message. In Mozilla e-mail, choose Help > About Internet Suite and find the ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果
反馈