Search

Search results

A couple of things about Stuxnet

There’s a relatively newly discovered (within the last few months) computer worm called Stuxnet , which exploits several Windows vulnerabilities (some of which were patched some time ago) as it installs itself on people’s computers. It l ...

Blog Post - Barry Leiba - Oct 5 2010 - 6:02am - 0 attachments

Entrust's PKI Adopted By Italian Certification Authority, IBM Subsidiary Intesa

... that secure many off-the-shelf applications using encryption, digital signatures and strong authentication. This PKI platform ... management services that enable authentication, encryption and digital signature capabilities across applications - all in a ...

Article - Anna Ohlden - Dec 6 2010 - 2:30am - 0 attachments

LRG And IHG Managed Estate UK Invest 9Million Pounds Sterling To Upgrade 59 UK Holiday Inn And Crowne Plaza Hotels With Acentic Horizon High Speed Internet Access And Panorama HD ITV

... in the bar areas, are the first to deploy the LG Pro:Idiom encryption technology over coax in Europe. Pro:Idiom provides end-to-end ...

Article - Anna Ohlden - Dec 2 2010 - 5:00am - 0 attachments

Sipera Systems Solution Now Rated 'Avaya Compliant'

... threat protection, policy enforcement, access control, and encryption in a single, flexible, plug-and-play device. The UC-Sec is ...

Article - Anna Ohlden - Nov 29 2010 - 8:00am - 0 attachments

Kontron PCIe/104(TM) MICROSPACE(R) MSMST: First SBC With Configurable Intel(R) Atom(TM) E600C Processor Series

... of security and reliability by carrying out the hardware encryption of all the transmitted data. Kontron offers software support ...

Article - Anna Ohlden - Nov 24 2010 - 9:10pm - 0 attachments

Replacing Your Cisco XML Gateway? Forum Systems Can Help!

... policy design for fundamental constructs so that keys, encryption/signature policies and firewall rules can be easily transitioned. - ... Patent for XML Security Functions Including XML-encryption, XML-decryption and XML-signatures - Forum Sentry Provides Secure, ...

Article - Anna Ohlden - Nov 24 2010 - 9:01pm - 0 attachments

Echoworx Partners With World's Largest Hosted Exchange Provider, Intermedia

... http://www.echoworx.com ) the leading provider of managed encryption services for complete enterprise email and data protection, today ... Control Panel, Intermedia will begin offering policy-based encryption to its customer base of over 250,000 users. Policy-based ...

Article - Anna Ohlden - Nov 11 2010 - 10:03am - 0 attachments

"Unbreakable" Encryption Works In Real Time Over Long Distances, NIST Says

... can perform a theoretically unbreakable “one-time pad” encryption, transmission and decryption of a video signal in real-time over a ...

Article - News Staff - Jun 8 2007 - 9:59pm - 0 attachments

Viability Of Quantum Computers As Unpredictable As Quantum Mechanics

... intractable, such as breaking today's most widely used encryption codes. Relying on the unusual rules of the submicroscopic quantum ...

Article - News Staff - Aug 6 2009 - 5:57pm - 0 attachments

Internet Cafes And Public Networks

... cookie, everything switches back to http, and there’s no encryption. When I click on an article and my browser sends my cookie again, ...

Article - Barry Leiba - Oct 28 2010 - 12:13pm - 0 attachments