Last year, in between writing Take Control books and Macworld articles, I managed to squeeze in another little project – writing the 900-page “Mac Security Bible,” published in January 2010 by Wiley.
The products from Control Break and Utimaco, however, only encrypt a machine’s hard disk, which may be adequate for protecting mobile devices but not much else. The third product, from Credant, is ...
Data storage security covers a wide landscape, including legal compliance, e-discovery, user access control and the physical security of data storage media. In this article we will focus on ...
Encryption secures information by translating it into computer code that’s unreadable to those who don’t have the means to access the information. These means of access can include passwords, ...