When it comes to encrypting files on your computer, there are numerous options to choose from. However, my favorite is ...
As hackers become increasingly sophisticated, they are targeting our personal data and stealing it at unprecedented rates. As a result, too many of us have received notices telling us our data has ...
Apple yesterday announced that end-to-end encryption is coming to even more sensitive types of iCloud data, including device backups, messages, photos, and more, meeting the longstanding demand of ...
This article appears in the Aug. 27, 2009, edition of ISO&Agent Weekly. As card-security breaches continue to hamper the payments industry, the parties involved in the transaction process are ...
"It’s déjà vu all over again" aptly describes each news headline about the next major data breach. Throughout history, if someone had valuable information, others would seek access to that information ...
What do you do when you need to perform computations on large data sets while preserving their confidentiality? In other words, you would like to gather analytics, for example, on user data, without ...
Encrypting data before storing on third-party servers. Also called "zero-knowledge encryption," zero-access encryption ensures that a user's data stored on OneDrive, Google Drive or other cloud ...