The prevalent use of standard FTP has become a huge security risk. It is critical to protect data transfers using secure FTP and other encryption standards. Attend this webinar and learn:
- The advantages and differences between FTPS and SFTP secure protocols - Authenticating servers using passwords, keys and certificates - Using OpenPGP and ZIP to encrypt files at rest and on the move - Generating audit trails…and more!
The last sentence on page 196 of the 802.11 spec creates a furor.
Written by Thomas M. Stockwell
Wi-Fi has a long history of security vulnerabilities and resulting fixes. WEP, TKIP, WPA, and the current standard of WPA2 have brought the technology closer to being secure. Indeed, the pervasiveness of Wi-Fi has changed everything—from how we design computer networks, to where we enjoy our coffee breaks, to how we buy and read our books. Travel in any foreign land, and the first question you'll find yourself asking the natives is "Where is the nearest Wi-Fi?"
By investing in an integrated data protection solution offering encryption, key management, and tokenization, users will have the best available insurance against significant business loss.
Written by Gary Palgon
Editor's Note: This article introduces a white paper titled "Best Practices in Data Protection: Encryption, Key Management and Tokenization." It is available free from the MC Press White Paper Center.
Protecting sensitive and business-critical data is essential to a company's reputation, profitability and business objectives. Companies know they can't afford a data breach—customer churn, loss of business, brand damage, fines and litigation. In today's global market, where business data and personal information know no boundaries, traditional point solutions that protect certain devices or applications against specific risks are insufficient to provide cross-enterprise data security.