Articles
In this week’s digital workplace roundup, Zoom buys encryption, Google offers Meets to nearly everyone and OpenText is sending people home to work for good.
Continue reading...
Privacy regs put strict rules on how companies store consumer data. While encryption isn't explicitly included in all, it should be included in your response.
Continue reading...
Mark Zuckerberg has spent a lot of time and effort trying to convince users that Facebook cares about privacy. However, not everyone is convinced.
Continue reading...
Blockchain has become an industry buzzword but not everyone understands what it is. Here are the basics for any business user.
Continue reading...
Why the recently discovered email vulnerablity makes encyrption essential. But its not all that's needed.
Continue reading...
With email providers adding new security features to their services, encryption is becoming more common. However, it is still not practical for many workers.
Continue reading...
Salesforce is adding Bring Your Own Key functionality to the platform encryption service within Salesforce Shield, a set of integrated security services built natively into the Salesforce platform.
Salesforce Shield rolled out last year. Its Platform Encryption is built into its metadata platform, which means customers can encrypt data while still
Continue reading...
The latest figures from the Ponemon Institute and IBM 2015 Cost of Data Breach Study show an ongoing increase in the cost of a data breach.
For companies that participated in the study, the number rose to $3.79 million. And that’s just the tangible cost.
Continue reading...
Only nine months before his job will very likely come to an end, the man overseeing much of the nation’s intelligence admits you can’t achieve intelligence in secret.
Continue reading...
SAN FRANCISCO —In a keynote address before the RSA Conference today that harkened back to the headstrong days of the 1980s, when defiant academics demonstrated encryption using floppy diskettes, RSA President Amit Yoran threw down the gauntlet.
Continue reading...
Should Apple let the government break encryption, asks every other e-mail Scott has received this week? The premise behind that question is the product of misinformation.
Continue reading...
A smartphone maker can’t just hand the government the tools it needs to break encryption, says Apple. But it’s been willing to let law enforcement give it a shot with older phones.
Continue reading...
Think back three years and you probably recall a cacophony of moans and groans from digital marketers.
Google had announced that search conducted through a Google service – Gmail, Google Plus, etc. – would be encrypted.
Continue reading...
If the whole web were encrypted by default, communications engineers argued, then malicious actors wouldn’t be able to guess which web sessions were relatively important by whether or not they were encrypted. The technology existed, the standards were in place and most of these engineers were supportive. It was 1999.
Continue reading...
Displaying 1-14 of 22