Five Ways to Protect Your Network TAGS: encryption | IDS | IPS | logging | vulnerability scanning Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →
April 25, 2024
Five Ways to Protect Your Network TAGS: encryption | IDS | IPS | logging | vulnerability scanning Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →
Three steps to avoiding massive HIPAA violation fines TAGS: encryption | HIPAA | mobile devices | PHI Million-dollar penalties are drawing the attention of HIPAA-covered entities around the nation. To avoid running afoul of HIPAA regulations, there …Continue reading →
Getting a Handle on Digital Certificates TAGS: digital certificates | encryption | web security It’s happened to all of us — at 4AM the phone rings and we find someone from operations on the …Continue reading →
Securing Mobile Devices with Containers TAGS: encryption | mobile device management | mobile security Chances are that right now, there are hundreds or thousands of individuals around the world carrying mobile devices that hold …Continue reading →
E-Mail Encryption Made Easy TAGS: e-mail security | encryption Preserving the confidentiality of electronic mail messages is one of the most vexing issues facing security professionals today. This is …Continue reading →
Securing Your Website with Digital Certificates TAGS: digital certificates | encryption | web security Website users are trained to recognize the signs and symbols of a secure website — from the HTTPS in the …Continue reading →
VoIP eavesdropping: Hardening network security to contain VoIP risks TAGS: encryption | VoIP Every organization considering a Voice over Internet Protocol (VoIP) telephone system deployment hears the same dire warnings: “Routing voice calls …Continue reading →
P2P encryption: Pros and cons of point-to-point encryption TAGS: encryption | PCI DSS There’s been a lot of buzz in security circles recently about point-to-point encryption (P2PE) technology and the potential it has …Continue reading →
Keep Those Notebooks Safe With Encryption TAGS: encryption | mobile devices Every year, thousands of notebook computers go missing around the country. The security administrators responsible for the safety of those …Continue reading →
Point to Point Encryption and PCI Compliance TAGS: encryption | PCI DSS Many vendors are touting point-to-point encryption as a solution to limit the DSS (Payment Card Industry Standard), a regulation affecting …Continue reading →