Quantcast
Last updated on April 23, 2014 at 17:36 EDT

Latest Public-key cryptography Stories

2012-06-28 23:02:10

Closing the critical security gap in predictable communication of weak encryption keys, MerlinCryption´s enterprise solution utilizes variable key length and a random data generator technology, which requires no key communication. Austin, Texas (PRWEB) June 28, 2012 Closing the critical security gap in predictable communication of weak encryption keys, MerlinCryption´s enterprise solution utilizes variable key length and a random data generator technology, which requires no key...

2012-06-26 23:03:35

Silanis, the leader in enterprise electronic signature solutions with the largest e-signature deployments, today marked the 12th anniversary of the federal ESIGN law by sharing stories of organizations and end-users who´ve embraced e-signature technology and changed the way they do business. A series of blogs will be posted on http://www.silanis.com/blog and http://blog.e-signlive.com throughout the ESIGN anniversary week. Montreal, QC (PRWEB) June 26, 2012 Silanis, the leader in...

2012-06-26 02:32:09

DALLAS, June 26, 2012 /PRNewswire/ -- Entrust, Inc., a global leader in securing online identities and information, today announced that its wholly owned subsidiary, Entrust Japan Co., Ltd., is launching a new Japanese language website to streamline access to its Entrust Certificate Service. This move will better serve customer requests from local companies and global subsidiaries, which have recently surged in Japan. After a thorough verification process, SSL and other electronic...

2012-06-21 23:00:18

Adding secure SSL to PHP cloud-hosted applications is the easiest it's ever been: Copy, Paste and Click. Pagoda Box simplifies cloud SSL certificates with automation and an intuitive dashboard. Rexburg, Idaho (PRWEB) June 21, 2012 Encrypted data is critical for online businesses. Yet a Secure Socket Layer (SSL) has been both difficult and costly with traditional cloud providers due to changing IP addresses and complex load balancing. Pagoda Box Cloud Hosting changes all that. A simple...

Microsoft Attempts To Douse Flame Malware
2012-06-15 12:44:49

John Neumann for redOrbit.com The malware, called Flame, a highly complex malicious tool that has actively targeted computers in the Middle East, was forced to self-terminate almost completely without a trace, and was in fact discovered only after UN´s telecoms arm reached out to security firms to get help with identifying a virus stealing data from many Middle Eastern computers last month. The Flame malware, which was recently discovered infecting computers in Iran and other...

2012-06-08 23:02:03

DigiCert, Inc. continues its rapid, sustainable growth, recognized in the UV50 awards. Lindon, UT (PRWEB) June 08, 2012 DigiCert, Inc. an online security provider for many of the most recognized brands and web sites in the world, today was named for the fourth consecutive year to the UV50 list, a ranking by Utah Valley Business Q Magazine of the area´s fastest-growing companies. While many startups make the list, DigiCert´s accomplishment is a tribute to its sustainable growth...

2012-06-05 06:32:43

SINGAPORE, June 5, 2012 /PRNewswire/ -- People that are concerned with privacy online or perhaps tired of their web-based email being used for marketing purposes now have a new, easy to use solution. Enterprises and individuals can maintain privacy with an affordable application for both Macintosh and Windows. Deadbolt LT empowers users and organizations to take control of their data and maintain their privacy even when using services like Dropbox, Gmail, or their favorite SaaS....

2012-06-05 02:33:21

CHIGAGO, June 5, 2012 /PRNewswire/ -- ARCHER SUMMIT -- News Summary: An April 2012 study by Forrester Consulting finds that current RSA(®) Archer((TM)) customers achieved a risk-adjusted Return-on-Investment (ROI) of 572% based on quantified key benefits. Customer participants in the study identified numerous benefits through their RSA Archer platform implementations including lower risk exposure, process automation, increased productivity and consolidation of unnecessary management...

2012-05-31 23:00:27

Organizations who exchange data with all levels of government can now secure their data transmissions using the FIPS 140-2 validated encryption module recently added to the GoAnywhere managed file transfer solution from Linoma Software. Omaha, Nebraska (PRWEB) May 30, 2012 Applying FIPS 140-2 validated encryption for data transfers is a critical compliance requirement for U.S. federal government and state agencies, as well as for those companies that exchange sensitive data such as...

2012-05-17 02:28:32

BEDFORD, Mass., May 17, 2012 /PRNewswire/ -- News Summary: RSA implements Key Management Interoperability Protocol (KMIP) specification standardized through OASIS into its RSA® Data Protection Manager solution to help enterprises worldwide centralize encryption policies and enforcement The KMIP 1.0 specification allows customers to use a single protocol for the communication between disparate key management and encryption systems, simplifying key management and reducing operational...


Latest Public-key cryptography Reference Libraries

secure_email
2012-07-01 22:51:38

Email encryption refers to encryption and authentication of email messages, which is typically done to protect content from being read by unintended recipients. Email technology is readily available but has yet to achieve widespread usage, most likely due to social factors, such as people seeing the use of encryption as paranoid, and as marking a message urgent whether it is or not. A recent survey (from January 2012) found that only 35 percent of companies have implemented email...

More Articles (1 articles) »