Search

Search results

Service Platform For Moroccans Living Abroad Secured By WISeKey Presented At The World Economic Forum In Marrakech By AIM And The Hassan II Foundation

... Abroad (SPM), based on WISeKey technology and the identity encryption system of the OISTE Foundation. The SPM is a Web 2.0 ...

Article - Anna Ohlden - Oct 26 2010 - 10:02am - 0 attachments

Quantum Repeater - Top Secret Messages Over Long Distances

... necessary to allow quantum communications such as the encryption keys to be relayed over larger distances - and using traditional ...

Article - News Staff - Oct 25 2010 - 10:24am - 0 attachments

Infosys Launches Finacle Mobile Banking 2.0

... intuitive user experience. Two factor authentication and encryption ensure fidelity of transactions. - The device-agnostic solution ...

Article - Anna Ohlden - Oct 20 2010 - 6:03am - 0 attachments

UK's Wireless Networks Open To Attack

... tips on using wireless networks safely: 1) Use encryption on your wireless access points (WAP) - Make sure you have Wi-Fi ...

Article - Anna Ohlden - Oct 14 2010 - 2:02am - 0 attachments

Complex Security, Risk And Compliance Challenges Require 'Air Traffic Control' For The Information Infrastructure

... business-critical controls in identity assurance, encryption key management ( ...

Article - Anna Ohlden - Oct 12 2010 - 1:00pm - 0 attachments

RSA Announces Solutions To Help Organizations Build An Advanced Security Operations Function

... business-critical controls in identity assurance, encryption key management ( ...

Article - Anna Ohlden - Oct 12 2010 - 8:05am - 0 attachments

RSA Research Readies Global Enterprises For New Era Of Compliance

... business-critical controls in identity assurance, encryption key management, SIEM, Data Loss Prevention and Fraud Protection ...

Article - Anna Ohlden - Oct 11 2010 - 4:03am - 0 attachments

A More Rational Way To Program Storage And Communication Of Objects

... into a base64 string. The compression is always done when encryption is performed and never done when the stream has a length that does not surpass 256 bits. The encryption is optional. The conversion into a base64 string is only done when ...

Article - Hans van Leunen - Oct 5 2010 - 2:37pm - 0 attachments

Echoworx Launches Self-Provisioning Feature For Encrypted Mail Gateway

... http://www.echoworx.com ) the leading provider of managed encryption services for complete enterprise email and data protection today ... can now take a hands-free approach to policy-based encryption allowing their resellers and customers to self-manage, self-brand ...

Article - Anna Ohlden - Oct 4 2010 - 9:03am - 0 attachments

Internet wiretapping

... be the normal communication channels that will have their encryption compromised, allowing officials to get the unencrypted version. If ... Once requiring specialized, high-tech, expensive machines, encryption is now easy, and any ten-year-old with a copy of PGP can do it. ...

Blog Post - Barry Leiba - Oct 1 2010 - 6:00am - 0 attachments