was successfully added to your cart.

Cart

Category

Key Management

2014 Mobile Data Management Buyer’s Guide Now Available

By | DCIG, Electronic Discovery, Encryption, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Key Management, Security, Threat Assessment | No Comments

DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.

Read More

Cable Labeling, the Cloud, Encryption and Virtual Server Backup Topics Make It Into DCIG’s Top 10 for 2011

By | DCIG, Encryption, Key Management, Quantum Data Protection, Virtualization | One Comment

Today I continue to reveal the Top 10 most read blog entries on DCIG’s website in 2011 with these four (4) entries typifying the two extremes of topics that DCIG’s readers tend to read the most. At one end of the spectrum are two forward looking blog entries on topics that every organization are examining now: the cloud and virtual server backup. At the other end of the spectrum are two older blog entries on the topics of cable labeling and encryption for which organizations continue to need relevant information.

Read More

Think AES is Unbreakable? RSA Security’s Shamir Debunks that Notion

By | DCIG, Encryption, Governance Risk and Compliance, Key Management, Security, Threat Assessment | One Comment

The 2008 Crypto Conference provided a lot to talk about this year. If you didn’t know a Crypto Conference existed, you aren’t alone, but it is where the best and brightest mathematicians gather to discuss cryptographic and cryptoanalytic research. However at this conference Adi Shamir (the “S” in RSA Security that stands for Rivest, Shamir and Adleman and that is now owned by EMC) gave a presentation for a new attack on encryption systems called the “cube attack”. The ramifications of this attack sent a collective shockwave across the data security sector. Since encryption is revered as our best alternative and last safe harbor from data exposure, any weakness shown by encryption algorithms can have a dramatic ripple effect in data security.

Read More
image_pdfimage_print
Bitnami