News

You may have seen some VPN providers boasting about using AES-256 encryption, but it’s not immediately apparent what this ...
Managing various encryption keys and other secrets has always been painful for enterprise security managers. A new service from GitGuardian called Has My Secret Leaked attempts to bring some clarity ...
Following SK Telecom, a hacking incident at KT has occurred, spreading fears of personal information leaks. On the 21st of last month, Professor Cheon Jeong-hee from the Department of Mathematical ...
Taking the time to review network encryption settings other than those in BitLocker needs much more review and examination to ensure thorough and consistent security. When we think about encryption ...
Covalent Technologies is hoping Intel's Itanium processor will be a good match for its encryption software. Covalent sells encryption software for Web sites using the Apache software. Covalent said it ...
USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive ...
Though CenturionSoft’s CenturionMail 3.0 did not meet the criteria for our server-based testing, its software is quite good, so we’ve included a brief summary of what it offers. CenturionSoft was ...
There are certain buzzwords you hear that immediately boost your confidence in the product that's being sold. You may have heard Apple describe its iPhone 15's aluminum enclosure as aerospace-grade, ...
The global encryption software market size was US$ 9.7 billion in 2021. The global encryption software market size is forecast to reach US$ 47.51 billion by 2030, growing at a compound annual growth ...