Crypto Goes Mainstream

    Date19 Oct 2006
    CategoryCryptography
    5178
    Posted ByBenjamin D. Thomas
    Richard Moulds explains how cryptography is converging with other security technologies, such as identity management systems and strong authentication, to lay a foundation for data and content security. With the distinction between inside and outside disappearing and remote users demanding access from anywhere and at anytime, organisations are turning to a more data-centric approach to security. And fundamental to this is the use of encryption.

    While cryptography has long been used to protect data in motion, it is now being applied to protect data at rest, in databases, file systems and storage devices. In addition, cryptography is expanding beyond privacy enforcement to establish the integrity of data and documents and to ensure the security of audit information, easing compliance.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"5","type":"x","order":"1","pct":45.45,"resources":[]},{"id":"56","title":"No","votes":"6","type":"x","order":"2","pct":54.55,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.