Comparing Cloud-Based Password Managers
Cloud-based password management apps are quickly becoming a popular solution to the myriad login credentials we all need to remember. Sure, you could use the same username and passwords for all the...
View ArticleSpiderOak: High-Security Cloud Storage
SpiderOak is an attractive, secure solution for file synchronization across multiple PCs and mobile devices running different operating systems and browsers. With the advent of cloud services and the...
View ArticleDigital Rights Management
Digital Rights Management (DRM) is an emerging issue, but one that affects the way we use media and hardware today. For instance, DRM affects ebooks and ebook readers; DVDs and portable media players;...
View ArticleEncryption: FDE vs. FHE
In the context of data protection, it’s common for developers to tout encryption as a one-size-fits-all solution. The reality is that encryption is just another tool to help meet the needs of data...
View ArticleData Protection as a Service
A recent Microsoft survey found that 58 percent of the public and 86 percent of business leaders are excited about the possibilities of cloud computing. However, over 90 percent remain concerned about...
View ArticleWS-Security 101
WS-Security outlines enhancements to SOAP messaging in order to provide quality of protection via message integrity, message confidentiality and single-message authentication. These mechanisms can be...
View ArticleEncryption Remains Rare
Security in the cloud has long been a concern, however, a recent Ponemon Institute report reveals that there has been a minimal increase in terms of encryption within cloud environments. Together with...
View ArticleSelling Data for Cloud Storage
These days, everything from smart phones, smart stores and smart homes are gathering and commoditizing information about us. It brings to the forefront the value and vulnerability of people’s private...
View ArticleChina’s MITM Attack Against Apple iCloud Users
According to a report by Great Fire, the internet censorship watchdog, China’s state firewall is performing a Man-in-the-Middle (MITM) attack against Apple’s iCloud users. Allegedly, the attack has...
View ArticleEncryption Interoperability and Key Management in the Cloud
The National Institute of Standards and Technology defines a cryptographic key as “a parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an...
View Article
More Pages to Explore .....