I was considering purchasing hard drive encryption software for our consultants' laptops in case they were lost or stolen. Does anyone have any recommendations or tips on what to look for in a good ...
Now that the capacities of small form-factor drives have hit hundreds of gigabytes, just about any corporate database can easily fit on a laptop. That affordable capacity gives users the opportunity ...
Trusted Computing Group's Opal spec for interoperable, self-encrypting drives isn't complete, but it's a great start If you’re not already a huge fan of the Trusted Computing Group, you should be. It ...
You could end up shortening the life of one key component in your PC. (And the tool won’t even work as intended, either.) ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...
In last week’s look at Kingston’s DataTraveler Locker+ thumb drive, I stressed the importance of keeping personal data safe. There are a multitude of reasons why you should take this seriously, but ...
Storage manufacturer Seagate has announced new-design LaCie Mobile Drive and LaCie Mobile Drive Secure hard drives with encryption, and made from sustainable materials. Following its recent desktop ...
If you think that encrypting your laptop’s hard drive will keep your data safe from prying eyes, you may want to think again, according to researchers at Princeton University. They’ve discovered a way ...
Encryption is a wonderful thing. While I don’t run full-drive encryption on my Windows desktop at home—courtesy of BitLocker—that’s only because I’m the only one who ever uses my system and I don’t ...
The Gizmo USB flash drive operates to 480 Mbits/s and includes software for password protection and data encryption. The device measures 66.5 x 16.5 mm, so multiple drives fit into neighboring USB ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...