Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Guides
Encryption

Encryption is the coding of data to prevent it from being read by anyone other than those who hold the means of decoding it. There are various levels of encryption, each having a different strength of security. The methods of coding and decoding is with the use of encryption keys, which can be public keys (for coding) or private keys.

Data can be encrypted when stored or encrypted when in motion. Encryption in motion is used for the secure transmission of data whilst encryption of stored data is used for static information electronically stored. Usually, this kind of encryption requires more robust key management to prevent the data being lost over large amounts of time due to lost keys.

Encryption news features are listed below;

Gaining clarity in the smoke and mirrors of encryption
Jonathan Newell spoke to Linus Chang of Scram Software about encryption and what's being done to establish more clarity
Swarm Cyberattacks Increase in Volume
The sophistication of attacks targeting organisations is accelerating at an unprecedented rate, according to Fortinet
AES encrypted electronic locking
Assa Abloy releases eCLIQ electronic locking with AES encryption for high security against electronic attacks
Easy encryption for cloud data security
ScramFS provides smaller businesses with easy to use encryption that clarifies the process of protecting data as well as providing compliance
Dynamic licence pooling for mobile security
Secure Mobile Access from SonicWall provides companies with easy BYOD security with licence pooling capability
All in one cloud storage protection
BullGuard extends its internet security product to cloud storage environments including Dropbox
Gesture control for video management
Synectics EX300 product uses tablet system to take gesture based commands from the operator for the control of certain video management system functions
Camera software adds speed to video encoder
Panasonic has reduced surveillance network latency with software on cameras which accelerate the H.265 video encoding
Cyber security warning to CCTV users
The BSIA is warning IP based surveillance system operators to be aware of the cyber security risks and ensure their systems are secure
Endpoint security with four critical elements
Intercept X from Sophos brings together four critical elements of endpoint security to reduce the chances of breaches
VMS support for panoramic cameras
The range of panoramic cameras available from Pelco are now supported on the latest version of the Olularis video management system
Ransomware defence collaboration
LightCyber is integrating its Magna platform with Ayehu eyeShare to improve defences against the spread of ransomware
Unified security platform enhancements
Access control and surveillance integration as well as a new disaster recovery mode characterise the latest release of Genetec Security Center at version 5.5
Security sandbox for software developers
Veracode is helping software developers to incorporate security into their designs with the use of the Veracode Developer Sandbox
Synchronised encryption of data protection
Sophos releases SafeGuard 8 encryption product that follows data across devices and protects it from accidental leaks and theft
Mid-year update on secure identity trends
HID Global shares its insight into the trends that are dominating the secure identity segment
IT security best practices applied to access control
AEOS end to end security employs encryption and strong authentication for hardened access control protection
Encryption ransomware discovery
PhishMe details the latest discovery of ransomware that using encryption and delivered by RockLoader.
Security skills need to keep up with IoT developments
SANS Institute is running security courses on existing and emerging wireless communication protocols that will define the internet of things
Two reader IP access control module
Versatile 2 reader access control module can be locally installed for reduced wiring and installation overhead
More processing power in VMS release
Ocularis has been released in version 5.2 providing more processing power and support for panoramic and 4k cameras
GDPR ready cloud security
CipherCloud introduces its cloud access control security system that is compliant with the European General Data Protection Requirement
Data breaches lower protection confidence levels
Research by Gemalto has shown that organisations which suffer data breaches lack confidence in their ability to protect data
Mobile point of sale security for Middle East
Hardware security modules from Thales e-Security are being used by payment technology company for mobile card payments in the UAE
Common criteria certification for HSM equipment
The nShield hardware security modules available from Thales e-Security gain common criteria EAL4+ certification
Cloud and web app security courses for Sweden
SANS security training courses in private cloud and web application security will be held during May in Stockholm
More intuitive interface for VMS
Video Management System from Wavestore gains upgrade to version 6 with many new features and improvements including more intuitive interface
Four IoT devices vulnerable to attack
BitDefender examines internet connected home devices and their vulnerability to cyber attacks as part of an IoT security study
Bank protects data from insider threats
Union Bank is using DatAdvantage from Varonis as part of its protective measures to secure sensitive data from insider threats
Network visibility survey shows enterprise vulnerability
Security blindspots in Global 2000 Enterprises highlight the need for greater visibility across the network to prevent security breaches.
Lack of high level trust in data sharing security
Survey amongst senior IT professionals has found that there is little confidence in the security of data sharing processes
Mac ransomware derived from Linux trojan
Bitdefender discovers the Linux.encoder trojan is the basis for the first piece of ransomware for Mac OS X devices
Body worn cameras with low latency
A new range of body worn cameras is available from Digital Barriers with extremely low latency for streaming video over 2G and GPRS networks
Report examines encryption trends
Privacy compliance and increased risk driving more corporate plans to deploy encryption technology on-premises and within the cloud
Copenhagen cyber security training events
Two advanced courses will be held in April in Copenhagen on web app penetration testing and advanced digital forensics
A guide to tackling cybercrime in 2016
David Emm of Kaspersky Lab describes the requirements for the correct mix of skills, strategy and security in order to be able to combat cyber crime
BIOS verification and APT for Dell Computers
Dell increases security on computer range with the inclusion of advanced threat protection technology and BIOS verification
Enterprise mobility management software
Mobile Control 6.0 from Sophos enables isolation of business data from personal information held on mobile devices
Advice on choosing the right encryption
ESET examines the complex world of encryption and provides a few tips on how to choose the correct products for different needs
Improved user access for corporate encrypted data
Kaspersky improves the usability of corporate encrypted data without compromising on its security
Unified appliance for 4G and LTE protection
Telecom security appliance from Clavister brings high levels of protection from security threats on 4G and LTE mobile networks
Survey indicates vulnerability of NHS data
IT security levels in the NHS are less than perceived with mobile healthcare technology stretching existing measures in the industry
Collaboration for improved wearable security
WISeKey and Kaspersky Lab cooperate on defining the security requirements of the Internet of Things with particular emphasis on wearable technology such as payment wristbands
New iteration of Linux encoder ransomware discovered
Bitdefender is offering a free tool to unlock files affected by the latest iteration of the Linux Encoder ransomware
Free API for website SSL implementation testing
Webmasters can now take advantage of a free API to provide security testing services for SSL/TLS implementations
Strong authentication across Bluetooth
Bluetooth Smart technology used for bringing public key cryptographic based authentication to mobile devices
Secure mobile payment app
Swiss company enabling secure mobile payments using smartphones with the help of mIDentity security platform from Kobil
Windows 10 certified security software with new features
Internet security software from BullGuard now includes additional features including encrypted Dropbox compatible file backup
Security management system compatible door controller
A 32 reader door controller from Tyco with advanced encryption supported by Software House security management system
Lack of encryption leads to fine for CPS
ViaSat blames lack of encryption for the risks posed during the data breach at the CPS potentially exposing video material of victim and witness interviews
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo