Oracle has introduced Oracle Key Vault as the latest addition to the Oracle Database security portfolio.
If you have your own WiFi network, it's important you secure it from unauthorised users and devices by configuring the wireless router appropriately, writes Steve McWhirter of Check Point.
The ‘S’ in HTTPS is more than just a letter: It’s a thin line separating privacy and exposure on the Internet, writes Steve McWhirter of Check Point Software Technologies.
In recent months Kaspersky Lab experts have been closely monitoring so-called Darknet resources, mostly the Tor network, and one thing that is immediately obvious is that the cybercriminal element is growing.
Sophos has announced a new approach to data protection with the latest release of Sophos SafeGuard Encryption 6.1, which it said addresses the two biggest issues in encryption – performance and usability.
Silk Road has reportedly reopened, though it is anybody’s guess whether the rebirth of the online drugs and weapons black market is for real, or in fact a honeypot, writes Lisa Vaas.
According to Akamai chief security officer (CSO) Andy Ellis, perspective and understanding the motivations of other departments and colleagues is key for any CIO or CSO aiming to gain traction in fulfilling internal security objectives.
Rising smartphone adoption, uncertain legislation and tougher encryption are among the trends that are going to define the mobile forensics space in the next 12 months, according to Cellebrite, which provides mobile forensic and data transfer solutions.
Encryption is the fifth most widespread protection technique, according to a survey conducted by B2B International and Kaspersky Lab in July this year – a sharp rise from the results of a similar survey in 2011 where it barely crept into the top 10.
DomainKeys Identified Mail (DKIM) Verifiers have been found to be susceptible to abuse by attackers due to weak encryption, allowing for the spoofing of e-mails from recognized domain names.