Where Should Security Keys be Kept in the Cloud?

VIDEO: Andy Ellis, chief security officer at Akamai, discusses his views on cloud security key management and provides a preview of an upcoming Internet security report.

The use of cryptographic keys is a linchpin of modern security. When it comes to the cloud, there is some debate as to where those keys should exist and how their placement impacts cloud security. Andy … more »

7 Full Disk Encryption Solutions to Check out

Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.

Full Disk Encryption Buyer's Guide

Full disk encryption lessens the odds of suffering a data breach when corporate laptops go missing or are left unattended.

Ransomware and the Internet of Things: A Growing Threat

IoT's integration into the world of business, along with the evolution of ransomware, creates the perfect storm for a cybersecurity arms race.

IoT Security Begins with Risk Assessment

Weigh benefits of IoT devices against potential security risks to determine on a device-by-device basis if the technology should be used, experts advise.

National Security Letters and Gag Orders: 5 Tips to Reduce Risk

To reduce your government surveillance 'attack surface' and protect customers' data privacy from U.S. government agencies, follow these five tips.

How to Conduct Internal Penetration Testing

Automated penetration testing tools and open source tools, especially those in Linux security distributions, are invaluable aids for internal pentests.