Times have changed, and more than a few tools have come and gone that were designed to encrypt your data and keep it safe from prying eyes or data thieves. It's time for a fresh look. Which ...
Encryption is an interesting thing. The first time I saw encryption in action was on a friend’s Gentoo Linux laptop that could only boot if the USB key with the boot partition and decryption key was ...
Exactly one year to the day since Edward Snowden leaked tens of thousands of documents that shed light on the vast scope of cybersurveillance that the agency conducts around the world, former NSA ...
Tozny, a Portland, Oregon startup that wants to help companies more easily incorporate encryption into programs and processes, introduced TozID today. It is an identity and access control tool that ...
Encryption software that performs many of the functions supporting military command and control networks now is easily available to the public. Not only does it match what U.S. forces use, but also it ...
Most of us—at least the cynical ones—assume that the NSA has probably beaten most of the encryption technologies out there. But a new report from Der Spiegel that draws on documents from Edward ...
Organizations are starting to take an interest in homomorphic encryption, which allows computation to be performed directly on encrypted data without requiring access to a secret key. While the ...
In light of recent events regarding the NSA tapping into personal data mines without warrant, interest in securing the cloud has significantly risen these past few months. Most cloud providers offer ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results