With decentralized encryption key management, mobile users control your encrypted data. Reduce your risk and regain control by using a centralized...
Developers who want an encryption algorithm that's highly secure—and will pass compliance—should go with products that can pass the FIPS 140-2 test.
As long as we continue to remain predictable targets and protect ourselves in predictable ways, security measures will be easy to bypass.
Security is facing a talent crunch. We can help fix the problem by boosting the number of women in tech and cybersecurity fields immediately,...
The Panama Papers are the latest in a series of exposures that should spur enterprises to re-evaluate security. Here are four areas you should...
The use of encryption has become pervasive in the enterprise. That's why allowing anything but the strongest encryption would have far-reaching...
Would backdoors actually help to solve crimes? After several weeks of researching Klaus Schmeh concludes they are no silver bullet for police...
Here are three actionable ways to keep data from being held hostage by the newest ransomware threat, Ransom32.
A new strain of ransomware has added a twist: It was fully developed in JavaScript, HTML and CSS—allowing for multi-platform infections.
Dropbox is a prime example of the security risks associated with shadow IT. Here's what the rise of Dropbox has taught us about securing data in...

Pages