Quantcast
Channel: CCSK Guide » encryption
Browsing latest articles
Browse All 12 View Live

Comparing Cloud-Based Password Managers

Cloud-based password management apps are quickly becoming a popular solution to the myriad login credentials we all need to remember. Sure, you could use the same username and passwords for all the...

View Article



SpiderOak: High-Security Cloud Storage

SpiderOak is an attractive, secure solution for file synchronization across multiple PCs and mobile devices running different operating systems and browsers. With the advent of cloud services and the...

View Article

Digital Rights Management

Digital Rights Management (DRM) is an emerging issue, but one that affects the way we use media and hardware today. For instance, DRM affects ebooks and ebook readers; DVDs and portable media players;...

View Article

Encryption: FDE vs. FHE

In the context of data protection, it’s common for developers to tout encryption as a one-size-fits-all solution. The reality is that encryption is just another tool to help meet the needs of data...

View Article

Data Protection as a Service

A recent Microsoft survey found that 58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. However, over 90 percent remain concerned about...

View Article


WS-Security 101

WS-Security outlines enhancements to SOAP messaging in order to provide quality of protection via message integrity, message confidentiality and single-message authentication. These mechanisms can be...

View Article

Encryption Remains Rare

Security in the cloud has long been a concern, however, a recent Ponemon Institute report reveals that there has been a minimal increase in terms of encryption within cloud environments. Together with...

View Article

Selling Data for Cloud Storage

These days, everything from smart phones, smart stores and smart homes are gathering and commoditizing information about us. It brings to the forefront the value and vulnerability of people’s private...

View Article


China’s MITM Attack Against Apple iCloud Users

According to a report by Great Fire, the internet censorship watchdog, China’s state firewall is performing a Man-in-the-Middle (MITM) attack against Apple’s iCloud users. Allegedly, the attack has...

View Article


Encryption Interoperability and Key Management in the Cloud

The National Institute of Standards and Technology defines a cryptographic key as “a parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an...

View Article
Browsing latest articles
Browse All 12 View Live




Latest Images