VIDEO: Andy Ellis, chief security officer at Akamai, discusses his views on cloud security key management and provides a preview of an upcoming Internet security report.
The use of cryptographic keys is a linchpin of modern security. When it comes to the cloud, there is some debate as to where those keys should exist and how their placement impacts cloud security.
Andy … more »
Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.
Full disk encryption lessens the odds of suffering a data breach when corporate laptops go missing or are left unattended.
IoT's integration into the world of business, along with the evolution of ransomware, creates the perfect storm for a cybersecurity arms race.
Weigh benefits of IoT devices against potential security risks to determine on a device-by-device basis if the technology should be used, experts advise.
To reduce your government surveillance 'attack surface' and protect customers' data privacy from U.S. government agencies, follow these five tips.
Automated penetration testing tools and open source tools, especially those in Linux security distributions, are invaluable aids for internal pentests.