Crypto Goes Mainstream

    Date19 Oct 2006
    CategoryCryptography
    5216
    Posted ByBenjamin D. Thomas
    Richard Moulds explains how cryptography is converging with other security technologies, such as identity management systems and strong authentication, to lay a foundation for data and content security. With the distinction between inside and outside disappearing and remote users demanding access from anywhere and at anytime, organisations are turning to a more data-centric approach to security. And fundamental to this is the use of encryption.

    While cryptography has long been used to protect data in motion, it is now being applied to protect data at rest, in databases, file systems and storage devices. In addition, cryptography is expanding beyond privacy enforcement to establish the integrity of data and documents and to ensure the security of audit information, easing compliance.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    Do you read our distribution advisories on a regular basis?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    23
    radio
    [{"id":"84","title":"Yes, for a single distribution","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"85","title":"Yes, for multiple distributions","votes":"6","type":"x","order":"2","pct":60,"resources":[]},{"id":"86","title":"No","votes":"4","type":"x","order":"3","pct":40,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.