Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS.
Curious about the security of your documents in the cloud? You’re not alone. We recently received an email from Dana in Marietta, Ga., who is asking this, "I just read your article on saving documents ...
Data storage security covers a wide landscape, including legal compliance, e-discovery, user access control and the physical security of data storage media. In this article we will focus on ...
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. Cloud computing services have ...
Encryption could soon become part of national debates over consumer issues ranging from data breaches to the safety of connected cars. Not long ago, it was the sort of thing that only bankers, spies, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results