Quantcast

Latest Encryption Stories

2014-08-05 23:00:22

The Unique Service Allows People to Send Files up to 5GB in Size to their Friends, Family Members and Colleagues Los Angeles, CA (PRWEB) August 06, 2014 pCloud.com, a new cloud storage provider that features a variety of top-notch web based, mobile and desktop applications, is pleased to announce that they have just launched a brand new encrypted transfer product called transfer.pCloud.com. Thanks to this innovative service, people can now send files up to 5GB in size in up to 10 emails...

2014-07-30 23:15:37

Alliance Key Manager for IBM Cloud provides encryption and key management to help IBM Cloud customers meet data privacy compliance regulations and security best practices. SAN FRANCISCO, CA (PRWEB) July 30, 2014 Townsend Security today announced a partnership with IBM that brings the power of Alliance Key Manager to the IBM Cloud marketplace. Starting today, IBM clients can use Alliance Key Manager for IBM Cloud to manage their encryption keys with the same FIPS 140-2 compliant technology...

2014-07-30 08:40:20

Identity Theft Main Reason for Breaches and Survey Shows 40 Percent of Consumers Very Unlikely To Do Business with Breached Companies BALTIMORE, July 30, 2014 /PRNewswire/ -- SafeNet, Inc., a global leader in data protection solutions, today released the highlights from its SafeNet Breach Level Index (BLI) for the second quarter of 2014. Between April and June of this year, there were a total of 237 breaches that compromised more than 175 million customer records of personal and financial...

2014-07-29 12:40:11

Encrypt Cloud Virtual Machines With Customer Controlled Encryption Management OTTAWA, July 29, 2014 /PRNewswire/ - CloudLink Technologies, a leader in cloud security and data encryption management, today announced the availability of CloudLink® SecureVM solution for Microsoft Azure, enabling Azure customers to manage the encryption of Windows and Linux-based virtual machines. CloudLink SecureVM helps secure both boot and data volumes in the cloud with a centralized approach that allows IT...

2014-07-29 08:41:33

Extends Offerings with Data-at-Rest Encryption and Access Control Solutions SAN JOSE, Calif., July 29, 2014 /PRNewswire/ -- Vormetric, a leader in enterprise data security for physical, virtual and cloud environments, today announced that Rackspace® Hosting (NYSE: RAX) has joined the Cloud Partner program, and will be offering encryption and key management services to customers via Vormetric's Transparent Encryption solution. Vormetric's Transparent Encryption combines the...

2014-07-22 16:25:35

LONDON, July 22, 2014 /PRNewswire/ -- Reportbuyer.com has added a new market research report:Endpoint Security Market [Security Suites, EPP, Anti-virus/malware, Firewall, IDS, IPS, Patch & Configuration Management, BYOD Security, Mobile Security, MDM, MAM, Endpoint Encryption] - Global Advancements, Forecasts & Analysis (2014 -...

2014-07-22 08:37:59

Solution pairing WidePoint digital certificates and SPYRUS WorkSafe live drives addresses security concerns related to "Bring Your Own Device" (BYOD) and business travelers' mobile computing needs MCLEAN, Va., July 22, 2014 /PRNewswire/ -- WidePoint Corporation (NYSE Mkt: WYY), a leading provider of Managed Mobility Services (MMS) featuring Cybersecurity and Telecommunications Lifecycle Management (TLM) solutions, announced today its collaboration with SPYRUS, Inc., to issue...

2014-07-15 08:35:25

Users are able to import and transfer encryption keys as well as utilize them for client side encryption BAAR, Switzerland, July 15, 2014 /PRNewswire/ -- Public Key Encryption is notoriously difficult to implement, regardless of the platform or service used. Confidesk now has a solution to that problem. Confidesk has created two new tools that help its users safely and easily manage public key encryptions. The service is provided as part of a comprehensive suite of encryption tools,...

2014-07-15 04:22:59

Aorato Releases New Research Report that Finds Weak Encryption Enables Attacker to Change Victim's Password without being Detected TEL AVIV, Israel, July 15, 2014 /PRNewswire/ -- Today, cybersecurity firm, Aorato, released "Active Directory Vulnerability Disclosure: Weak encryption enables Attacker to change a victim's password without being logged" report, which identifies a new threatening flaw within Active Directory that enables attackers to change a victim's password,...

2014-07-10 23:00:54

The man-portable communication systems market research report categorizes the market on the basis of telemetry application, region, country, forecasting revenues, market share, and analyzing trends in each of the sub sectors. (PRWEB) July 11, 2014 According to a new market research report "Man-Portable Communication Systems Market by Platforms (Land, Airborne, Naval), Application (Software Defined Radios, SATCOM, Encryption, Smartphones, Homeland Security, Commercial), & by...


Latest Encryption Reference Libraries

secure_email
2012-07-01 22:51:38

Email encryption refers to encryption and authentication of email messages, which is typically done to protect content from being read by unintended recipients. Email technology is readily available but has yet to achieve widespread usage, most likely due to social factors, such as people seeing the use of encryption as paranoid, and as marking a message urgent whether it is or not. A recent survey (from January 2012) found that only 35 percent of companies have implemented email...

More Articles (1 articles) »
Word of the Day
cacodemon
  • An evil spirit; a devil.
  • A nightmare.
  • In astrology, the twelfth house of a scheme or figure of the heavens: so called from its signifying dreadful things, such as secret enemies, great losses, imprisonment, etc.
'Cacodemon' comes from a Greek term meaning 'evil genius.'
Related