This is where Honey Encryption comes in. As an added layer of protection, the scientists have proposed linking a password system to a honeychecker.
Browsing: Data Protection
By developing Encrypted Content Search in our Secured eCollaboration solution, we get around this deficiency, without compromising security
2014 will be the year of security analytics. This is my prediction based not on the hype of tech suppliers but a genuine pent-up demand from the market
of course mobile working and BYOD increase the risk of data loss, as staff connect various devices to the corporate network
CipherCloud have created another brilliant infographic that shows just how important encryption really is
With all of the NSA, RSA privacy concerns in the news tied to if your computer systems or networks can be eves-dropped, what about your data storage?
CipherCloud, expands its platform through the acquisition of CloudUp Networks, a privately held provider of SaaS application security.
As the evening wore on, I suddenly started to wonder about “whistle blowers”. After all we live in a culture that puts the whistle blower on a pedestal.
Following the news that Target announced regarding it´s recent data breach affecting 110 million customers, here are some thoughts from security experts
Security policy and awareness are often lumped together and usually perceived as Awareness training on company policies.