Beiträge verschlagwortet mit encryption

laptop computer
BYOD · VPN

A Look at BYOD in 2016

Happy 2016! It’s a new year, and a time for fresh resolutions to improve your life over the next 12 months, whether that involves running a marathon, getting a new job or taking that trip abroad...

Encryption · IT policy

IoT: Get Security Right The First Time

Let's start building security into the Internet of Things now, before everything becomes connected -- and hackable.

Encryption · Industry Commentary · SSL · VPN

Stop the Bleeding: How Enterprises Can Address the Heartbleed Bug

By now, you’ve likely heard about the recently discovered Heartbleed bug. At its simplest, this bug allows cyber criminals to exploit a flaw in technology that encrypts sensitive information, making...

Encryption · Industry Commentary · VPN

Ransomware Looks to Blackmail Enterprises

When most people think of threats to their computer systems and networks, the usual suspects come to mind — malware and keystroke loggers that are meant to steal passwords to remotely access corporate...

Encryption · Industry Commentary · IT policy · VPN

Why Enterprises Are Struggling So Much with Encryption

Encryption. For most organizations, the need for it is very apparent, but for some reason, its implementation often falls well short of goals and expectations. The obvious question here is: why? A...

Encryption · IT policy · VPN

Stopping Remote Access Breaches with “Honey”

Encryption has long been one of the most effective tools to prevent the exposure of sensitive data. As such, hackers are constantly working on new ways to crack encryption algorithms and exploit...

Encryption · Industry Commentary · VPN

Target and Neiman Marcus Hacks: The Network Security Lesson to Learn

Even if you’re not one of the tens of millions of customers that have had your credit card data stolen and sold on the black market, you’ve almost certainly heard about the Target hack that occurred...

Encryption · Industry Commentary · VPN

Encryption: The Key to Network Security

In the network security industry, we see firsthand how encryption prevents a wide range of security breaches, protects corporate networks and safeguards sensitive, personal information and...

Mobile · Shows · VPN · Wi-Fi

5 Ways to Keep Your Data Secure While Traveling to Interop NY

By Patrick Oliver Graf, General Manager, Americas of NCP engineering

Certificates · Endpoint Management · Industry Commentary · VPN

Why Elliptic Curve Cryptography is Necessary for Secure Remote Access

Recently, there have been many advances in cracking encryption algorithms that are the basis for the most common cryptography systems, such as Diffie-Hellman, RSA and DSA. Experts warn that within the...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK