In response to dramatic and widely-publicized losses of data over the last few years, IT execs are moving to deploy encryption in every corner of the enterprise. While encryption does reduce the ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Fortanix, the seven-year-old Santa Clara, California-based startup ...
Open source project GPG Sync makes it easier for organizations already using GPG to encrypt email messages to manage different user keys In all the discussion about using encryption, a critical point ...
CipherTrust Cloud Key Manager helps organizations meet compliance requirements and support data governance across hybrid and multi-cloud environments Latest Bring Your Own Key integrations include ...
Sun announced today that it is throwing its hat into the standards arena, proposing that its open-source key management API be used as a universal way to allow encrypting devices to communicate with ...
As cloud infrastructure and compliance regulations become more complicated, companies are looking to simplify data security by adopting more pervasive encryption of sensitive data and consolidating ...
Hewlett-Packard Co., Palo Alto, Calif., on Monday unveiled an addition to Fibre Channel storage switches to encrypt data over a SAN, an encryption device to manage LTO-4 tape drive encryption keys, a ...
Companies have a problem with encryption: While many businesses duly encrypt sensitive data, there is no standard strategy for deploying and managing a key-management infrastructure. Every ...
The increase in cyberthreats from both internal and external sources has put the onus on government agencies, particularly at the federal level, to implement strong cybersecurity architectures. While ...
Cloud computing is now a key part of modern IT. Businesses, developers, and everyday users rely on cloud services to run apps ...
U.S. government information networks handling controlled unclassified and national security information are under continual cyber attack by sophisticated peer and near-peer adversaries. Evolving cyber ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results