Just because you have antivirus software installed on your PC doesn't mean a zero-day Trojan can't steal your personal data. The best encryption software keeps you safe from malware (and the NSA).
To paraphrase Fox Mulder, trust no self-encrypting SSD. As of the latest Windows 10 update, Microsoft’s BitLocker encryption tool that’s built into Pro and Enterprise versions will no longer assume ...
As any CryptoParty attendee will attest, you can only ensure a reasonably private communication by using “strong, end-to-end encryption,” “strong” here meaning nearly impossible to break, even with ...
If you want to keep your business’s data safe, encryption is essential. By encrypting files directly, you ensure that they can’t be opened without a password — protecting the files from hackers and ...
Encryption software that performs many of the functions supporting military command and control networks now is easily available to the public. Not only does it match what U.S. forces use, but also it ...
Voltage Security announced a software tool kit for adding what is known as “format-preserving encryption” to new and legacy applications. Voltage Security announced a software tool kit for adding what ...
Palo Alto, Calif.-based encryption vendor PGP on Monday released updates to its core product line, PGP Encryption Platform and Universal Server, to better lock down information and allow resellers the ...
Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP). The world of email encryption has changed ...
PGP Corp. is setting out to do what Network Associates couldn't--entice enterprise customers to buy PGP encryption products by making them easier to use. On Monday ...
Open-source legend TrueCrypt may be gone, but the usefulness of full disk encryption carries on. So what’s a crypto fan to do now for their encryption needs? The first phase of the TrueCrypt audit ...
As any CryptoParty attendee will attest, you can only ensure a reasonably private communication by using “strong, end-to-end encryption,” “strong” here meaning nearly impossible to break, even with ...