SAN FRANCISCO--(BUSINESS WIRE)--Zettaset, a leading provider of data protection solutions, today announced an expanded collaboration with Red Hat to bring its next generation XCrypt Full Disk ...
We have become a mobile computing society. Laptop computers now outsell desktop computers. Our handheld devices, which used to be simply phones and contact managers, now have the ability to create, ...
Lost devices and data theft remain a major worry for enterprise IT firms. One way to protect against data loss is full-device encryption, now made easier to implement via self-encrypting hard drives ...
There was a time, not all that long ago, when a fully-encrypted system disk was something only for people with money to burn. You bought a special disk controller which performed hardware-based ...
HELSINKI--(BUSINESS WIRE)--Jetico, long-trusted pioneer in data encryption, announced today support for Mac computers with a T2 security chip. With this update, BestCrypt Volume Encryption – ...
A new survey by the Ponemon Institute finds that enterprise-wide encryption strategies are accelerating but there are risks to consider I was talking about security with a good friend of mine who runs ...
A few years ago, I began writing and talking about data encryption management problems on the horizon. I was right about the issues but a bit aggressive on the timing. Based on what I’m seeing lately ...
In my last post, I talked about some of the tools that claim to recover your stolen laptop. This time I want to review another series of tools that can be useful protection as well: doing whole-disk ...