The Jericho Forum is an organization pushing for innovation in e-commerce security. In this essay, Joerg Horn, head of gateway solutions at Utimaco, a Jericho Forum member, discusses combining ...
As hackers become increasingly sophisticated, they are targeting our personal data and stealing it at unprecedented rates. As a result, too many of us have received notices telling us our data has ...
On average, it takes businesses 287 days to find and contain a data breach, giving attackers over nine months to access and steal any records they want from the database. However, encrypting those ...
MongoDB Inc. today introduced new features that will enable enterprises to query their data without decrypting it and carry out large-scale analytics projects more easily. The features were announced ...
Every time you send a text, pay for groceries with your phone, or use your health site, you are relying on encryption.
NICOSIA, Cyprus, Nov. 13, 2019 /PRNewswire/ -- NordVPN, the world's most advanced VPN service provider, officially launched its latest cybersecurity product — NordLocker. The new tool secures all ...
The world has gotten a lot more serious about privacy and data protection, but in many cases business models that rely on personalization of one kind or another have struggled to keep up. Today, a ...
If you run a mostly Linux-based network with some Windows machines, but want to standardize on open source data encryption tools on all your platforms, now you can ...
"It’s déjà vu all over again" aptly describes each news headline about the next major data breach. Throughout history, if someone had valuable information, others would seek access to that information ...
It happened to me once — I lost my small 64GB USB drive I'd used for work. I was pretty sure it had nothing too important in it. But then I started wondering… what if it contained some sensitive files ...
Encryption secures information by translating it into computer code that’s unreadable to those who don’t have the means to access the information. These means of access can include passwords, ...