I was considering purchasing hard drive encryption software for our consultants' laptops in case they were lost or stolen. Does anyone have any recommendations or tips on what to look for in a good ...
Deleting a file on a computer rarely means it is gone. On traditional hard drives and many solid-state drives, what ...
Losing your laptop can be expensive in three ways. First, you’ll spend hundreds or thousands of dollars to replace the hardware. Second, you’ll suffer the time and aggravation of restoring your data, ...
Lost devices and data theft remain a major worry for enterprise IT firms. One way to protect against data loss is full-device encryption, now made easier to implement via self-encrypting hard drives ...
Encryption is an interesting thing. The first time I saw encryption in action was on a friend’s Gentoo Linux laptop that could only boot if the USB key with the boot partition and decryption key was ...
I am a bit confused by all the full disk encryption methods available between hardware options like OPAL and software/hardware options like Bitlocker for a X1 Carbon Generation 6 thinkpad. I am about ...
If a third-party disk encryption software is incompatible with the next Windows 10 Feature Update, it may cause the upgrade to crash. Let’s take a look at a typical scenario where you can encounter ...
In my last post, I talked about some of the tools that claim to recover your stolen laptop. This time I want to review another series of tools that can be useful protection as well: doing whole-disk ...
Let’s be honest for a moment: when it comes to cyber security habits, companies aren’t typically interested in investing the proper time, resources and infrastructure changes necessary to properly ...
Passware pioneers in releasing the commercial software, which recovers LUKS passwords at an incomparable speed of 300 passwords per second using the benefits of NVIDIA or AMD GPU acceleration.
A new ransomware strain is implementing a troubling but so far relatively rarely used technique to encrypt data in a target environment. Instead of encrypting files on endpoint systems like most ...