March 28, 2024
When a laptop turns up stolen, it’s reassuring to know that the contents of the device were encrypted, transforming a potentially disastrous data breach into a simple case of missing hardware. In this podcast we look at the issues surrounding the use of encryption to secure data stored on endpoint computers.
Specifically, we address
Listen to the podcast: <A HREF=”http://searchsecurity.techtarget.com/podcast/Curveball-Endpoint-encryption-strategies”>Endpoint encryption strategies</A>
Broadcast on SearchSecurity, August 2009
Leave a Reply