Database encryption can be drastically improved through the use of hardware security modules (HSMs), which provide offline encryption services.
A new policy announced by the White House in March requires federal websites to support traffic encryption within two years through HTTPS.
Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.
Encrypting your data is an important step for keeping it secure. Follow these tips to keep your data encryption project running smoothly.
Americans filing taxes online should avoid doing so over public Wi-Fi networks so they aren't the next victims of cybercriminal activity.
Do you know who has access to the keys that encrypt your data? How to keep and control access of your keys when using a third-party source.
Blockchain.info has increased its privacy and security measures for all its users by becoming the second website in the world to receive a Tor address.
Many major websites are still vulnerable to the POODLE attack, which now works against certain Transport Layer Security (TLS) implementations.
As data breaches continue to plague retailers, organizations should consider encrypting their data to help reduce the impact of a potential data breach.
The innocuously named POODLE attack disclosed by security researchers at Google this week demonstrates the dangers of supporting obsolete technology.