As cloud infrastructure and compliance regulations become more complicated, companies are looking to simplify data security by adopting more pervasive encryption of sensitive data and consolidating ...
The LEAF Community’s new LEAF Verified credential leverages NXP’s MIFARE DUOX technology and public key cryptography to simplify key management, strengthen security and ...
CipherTrust Cloud Key Manager helps organizations meet compliance requirements and support data governance across hybrid and multi-cloud environments Latest Bring Your Own Key integrations include ...
BEDFORD, Mass., May 6/PRNewswire/ --RSA, The Security Division of EMC (NYSE: EMC) today announced enhancements to RSA(R) Key Manager Suite (RKM), its enterprise encryption key management system ...
Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with content, and download exclusive resources. In this episode, Thomas Betts chats with ...
Box announced a new product today called Box KeySafe that should help simplify encryption key management, putting it in reach of small to medium sized businesses (SMBs) who require encryption, but ...
Agencies seeking to protect their data in motion or at rest often use different encryption strategies, many of which are managed by application owners and database administrators across the ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
Sun announced today that it is throwing its hat into the standards arena, proposing that its open-source key management API be used as a universal way to allow encrypting devices to communicate with ...
MINNEAPOLIS--(BUSINESS WIRE)--Entrust a global leader in trusted identity, payments and data protection, today announced that it has acquired HyTrust, Inc. an innovative provider of virtualized and ...
Open source project GPG Sync makes it easier for organizations already using GPG to encrypt email messages to manage different user keys In all the discussion about using encryption, a critical point ...