The distributed database technology behind bitcoin can be cost effective for enterprise applications —but not always.
Limiting the number of keys in the system because the key server can't handle enough is too risky. If you don't believe me, wait until you read...
More patching is not the answer. Neither is hoping that software vulnerabilities will simply go away. A true security/business balance can only be...
Bitcoin uses a blockchain. Should you? Luther Martin explains the fundamental benefits and drawbacks of using the blockchain distributed database...
As enterprises demand that more and more data be encrypted, having a centralized key management strategy is critical. Here's how to manage all of...
Encryption doesn't have to affect app performance. By minimizing your app's network connections you can maximize both performance and security.
With decentralized encryption key management, mobile users control your encrypted data. Reduce your risk and regain control by using a centralized...
Developers who want an encryption algorithm that's highly secure—and will pass compliance—should go with products that can pass the FIPS 140-2 test.
As long as we continue to remain predictable targets and protect ourselves in predictable ways, security measures will be easy to bypass.
Security is facing a talent crunch. We can help fix the problem by boosting the number of women in tech and cybersecurity fields immediately,...

Pages