This is probably a familiar situation for you: you walk into a Starbucks (or favorite coffee shop) to drink your daily beverage of choice. While you’re sipping, you log onto the Wi-Fi network to check your work email.
Our previous blog posting established that storage encryption technologies, such as full disk encryption (FDE), and their associated key management functions should be separated from each other.
Have you ever wondered what happens to your data once a thief gets their hands on it? Bitglass, a cloud security company conducted an experiment to find out just what happens when data has been stolen. And the answer may surprise you.
What do you know about data encryption and decryption? Whatever it is, it might not be fully right. There are myths circulating about this topic, myths which can actually hurt your business. We’ve identified five of them, and explain why they’re wrong.
On May 21st WinMagic was chosen as one of the 2015 winners of the CATAAlliance Innovation and Leadership Awards. The CATAAlliance Innovation Awards celebrate the best in Canadian advanced technology and winners are recognized for their innovation, expertise, and leadership in Canada’s technology community.
Healthcare data is the most valuable data a thief can get their hands on. Last year Ponemon did a study, which found that of the 40 companies across 12 industries surveyed, that negligence or human error is the primary root cause of data breaches.
Wireless encryption is a security tool to protect a company’s network. The word “encryption” means to turn something into code. When IT professionals use wireless encryption, they are encoding the messages sent between a computer’s wireless adapter and a wireless router.
The term “data at rest” refers to data in computer storage. Its opposite is data in motion, which is a phrase used to describe data traversing a network. It can even apply to information temporarily residing in a computer’s memory.
I was fortunate to be able to attend the RSA Security Conference in San Francisco last week. The conference was bigger than ever with lots of new vendors displaying a wide breath of security products.
In August 2014, the digital security company Websense released a report stating that more than one-third of Canadian IT professionals knew for certain that their company’s data had been the victim of a serious breach.
I just read an article from eWeek that focused on how common data breaches are in the healthcare industry. OK, I said to myself, but then given my inquisitive nature at times, I typed in “healthcare data breaches” on one of leading search engines and voila!