A startup named Ravel claims breakthroughs in fully homomorphic encryption, a hotly-pursued method for analyzing encrypted data without ever decrypting it. Now imagine another approach: instead of ...
Managing various encryption keys and other secrets has always been painful for enterprise security managers. A new service from GitGuardian called Has My Secret Leaked attempts to bring some clarity ...
NetLib Security’s CTO, David Stonehill, underscored the escalating threats posed by cybercriminals and the growing public mistrust around data privacy. In 2025 alone, cybercriminals exposed more than ...
U.S. government information networks handling controlled unclassified and national security information are under continual cyber attack by sophisticated peer and near-peer adversaries. Evolving cyber ...
Covalent Technologies is hoping Intel's Itanium processor will be a good match for its encryption software. Covalent sells encryption software for Web sites using the Apache software. Covalent said it ...
Though CenturionSoft’s CenturionMail 3.0 did not meet the criteria for our server-based testing, its software is quite good, so we’ve included a brief summary of what it offers. CenturionSoft was ...
USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive ...
Arattai, a made-in-India messaging app, is gaining traction for its features and usability. Users on X have been comparing it ...
There are certain buzzwords you hear that immediately boost your confidence in the product that's being sold. You may have heard Apple describe its iPhone 15's aluminum enclosure as aerospace-grade, ...
If you use your laptop as a glorified game console or TV, you typically don't spend a lot of time thinking about security. It's only when that device becomes a workstation that you realize the usual ...