Whether it's a reaction to the Snowden revelations, a reaction to the continual news of massive data breaches, or just the obvious need to secure data in the cloud -- or all of the above -- new ...
One easy way to up your privacy game and communicate securely online is to start using apps that utilize end-to-end encryption. End-to-end encryption prevents any bad actors from picking up your ...
Here we go again: the Australian government is the latest to plan new laws that will require companies to be able to unscramble encrypted communications. In particular, the government wants tech ...
Riddhiman Das was working for Alibaba searching for privacy technology companies to invest in to solve Alibaba’s data privacy challenges. He never found the right one, so he decided to build it ...
Steve Orrin is the federal CTO for Intel Corporation. He has held architectural and leadership positions at Intel, driving strategy and projects on identity, anti-malware, HTML5 security, cloud and ...
SPRINGFIELD, Va.--(BUSINESS WIRE)--Spok, Inc., a wholly owned subsidiary of Spok Holdings, Inc. (NASDAQ: SPOK) and the global leader in enterprise critical communications, today announced the ...
I have a long and tattered history with cryptography. Ever since I learned about Bob and Alice I was smitten. I knew it was important because cryptographic algorithms could be used to protect ...
Encryption may sound simple in theory, but in practice, it’s a demanding process in terms of both management and processing power. Increasingly, data centers are finding help for the process from a ...
Current encryption methods are far from perfect—a fact highlighted by the numerous data security breaches that have occurred over the past few years. Technological limitations in the "trusted server" ...