As hackers become increasingly sophisticated, they are targeting our personal data and stealing it at unprecedented rates. As a result, too many of us have received notices telling us our data has ...
Strong encryption is the backbone of digital privacy and secure data. Pressure on the government to weaken encryption is mounting, which raises some serious concerns. How do we preserve strong ...
In today’s digital economy, where organizations rely on cloud computing, mobile technologies and data-driven decision making, securing sensitive information has never been more critical. Encryption ...
Pervasive encryption that protects data not just in transit and at rest but in use — thus freeing companies of the fear of data breaches — has long been a dream of business executives, IT teams, and ...
Jim Kohlenberger is co-chair of Trusted Future and an innovation policy leader who has served as a policy advisor to two U.S. Presidents. The Washington Post reported in February that the U.K.
Curious about the security of your documents in the cloud? You’re not alone. We recently received an email from Dana in Marietta, Ga., who is asking this, "I just read your article on saving documents ...
A single security breach can jeopardize everything you’ve built. The theft of intellectual property and confidential customer data can result in a cascade of consequences, from hefty financial losses ...
The Jericho Forum is an organization pushing for innovation in e-commerce security. In this essay, Joerg Horn, head of gateway solutions at Utimaco, a Jericho Forum member, discusses combining ...
Apple on February 21 withdrew its Advanced Data Protection feature from the United Kingdom following government demands for backdoor access to encrypted user data. The move came after UK officials ...
“Download Signal,” a career federal employee and longtime source for information told me last month. “We can talk on that. It’s not a good time right now. A lot of us are nervous.” I received similar ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results