Data and Information Security | News, how-tos, features, reviews, and videos
Explore related topics
The bipartisan panel advises Congress to look into using legal hacking methods to break into tech products
Developers can use Project Wycheproof to test cryptographic algorithms against a library of known attacks to uncover potential weaknesses
Vera's approach to information rights management lets IT apply security rules and permissions to Office 365 files no matter where they're saved
Custom-made Thunderbolt devices can be used to extract the encryption password from locked Macs
The massive data breach can be an opportunity to do some cleanup and implement security recommendations
Similar summits could take place as often as once per quarter
Facebook has released an internal tool that makes it easier for enterprise IT teams to search public Certificate Transparency logs for all certificates associated with their domains
You can use blockchains to track diamonds and make payments ... but what link do they have with pork?
The two sides are expected to try to sort out issues at a meeting this week in New York
IT admins, take note: The CA Security Council will require you to prove you are taking appropriate steps to secure your private keys from theft or misuse