Dr Yu explained, «There are excellent end - to - end
encryption services out there, but by definition they rely on your device itself remaining secure; once a device has been compromised there's little we can do.
Not exact matches
And today at the Black Hat security conference here in Las Vegas (where mid-day temperatures were hovering at a respectable 98 degrees in the shade), Yahoo's new security researcher and veep of information security, Alex Stamos, officially disclosed that his company intends to roll
out end - to - end
encryption in its email
service in the fall.
Yes, the mobile banking
service utilizes best practices from online banking, such as HTTPS, 128 - bit SSL
encryption, or password access and application time -
out when your phone is not in use.
The cloud - based document management
service NetDocuments today announced the roll -
out of an enhanced security architecture with stronger
encryption technology and new capabilities for users to manage their own
encryption keys.
If having an audit trail along with
encryption, including registered e-receipts, time stamps and more appeals then check
out RPost's SecuREmail (www.rpost.com)
service which bundles email
encryption with their proof of delivery
service and now even electronic signatures.
Something I've spoken
out a little bit about was I think that there's a place for a regulator, even relating that activity to the public interest and protecting of the public interest to say provide more proactive of a device on Cloud
services and maybe even approved configurations of equipment and
encryption tools that lawyers could practically take off the shelf and use.
While there are stand - alone commercial
services out there like aforementioned BTGuard, the rise of faster computers and mobile devices coupled with faster connections (both of which reduce the impact of
encryption overhead) the proxy has largely fallen
out of favor as more and more people opt to use superior VPN solutions.
Find
out about the
service provider's security policies and procedures, data
encryption, and password protection.