Researchers at the Netherland’s Radboud University have uncovered serious security issues with several solid-state drives that use hardware-based encryption—vulnerabilities that would allow an ...
I was considering purchasing hard drive encryption software for our consultants' laptops in case they were lost or stolen. Does anyone have any recommendations or tips on what to look for in a good ...
Cryptomator creates encrypted vaults on your PC that work like regular folders. When you drop a file into a vault, it gets ...
Security researchers at Radboud University in the Netherlands have discovered a flaw in several manufacturers’ solid state hard drive firmware that can be exploited to read data from self-encrypting ...
Reacting to a recently discovered security hole in hardware-based encryption in solid state drives, Microsoft recommends that if you’re using BitLocker to protect a solid-state drive, you switch from ...
HELSINKI--(BUSINESS WIRE)--Jetico, long-trusted pioneer in data protection, has announced the release of its Mac drive encryption software. Expanding on many years of Windows support, BestCrypt Volume ...
Now that the capacities of small form-factor drives have hit hundreds of gigabytes, just about any corporate database can easily fit on a laptop. That affordable capacity gives users the opportunity ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...
How-To Geek on MSN
Why you should save your most-used apps to a flash drive
An absolute must for immediately taking advantage of portable computing is a web browser, and Mozilla Firefox, Portable ...
When Microsoft announced that Windows Vista was going to be available in multiple editions, curiosity turned toward the higher-end versions of Vista targeted at corporate environments (Vista ...
Companies relying on SEDs (self-encrypting drives) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results