Sun announced today that it is throwing its hat into the standards arena, proposing that its open-source key management API be used as a universal way to allow encrypting devices to communicate with ...
eSpeaks host Corey Noles sits down with Qualcomm's Craig Tellalian to explore a workplace computing transformation: the rise of AI-ready PCs. Matt Hillary, VP of Security and CISO at Drata, details ...
Agencies seeking to protect their data in motion or at rest often use different encryption strategies, many of which are managed by application owners and database administrators across the ...
IT security firm Thales has announced the publication of its latest Global Encryption Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales, reveals ...
Karen Scarfone is the principal consultant for Scarfone Cybersecurity. She provides cybersecurity publication consulting services to organizations and was formerly a senior computer scientist for the ...
LAS VEGAS & WESTON, Fla., Feb 22, 2010 (BUSINESS WIRE) -- Thales, leader in information systems and communications security, announces it is working with IBM to integrate IBM Tivoli(R) Key Lifecycle ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Organizations looking for an alternative to managing data ...
Nathan Eddy works as an independent filmmaker and journalist based in Berlin, specializing in architecture, business technology and healthcare IT. He is a graduate of Northwestern University’s Medill ...
The actions of certain large social networks have recently highlighted how a small number of people possess significant power over the masses and how this power is sometimes misused. Consequently, ...