I was considering purchasing hard drive encryption software for our consultants' laptops in case they were lost or stolen. Does anyone have any recommendations or tips on what to look for in a good ...
Now that the capacities of small form-factor drives have hit hundreds of gigabytes, just about any corporate database can easily fit on a laptop. That affordable capacity gives users the opportunity ...
Trusted Computing Group's Opal spec for interoperable, self-encrypting drives isn't complete, but it's a great start If you’re not already a huge fan of the Trusted Computing Group, you should be. It ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...
In last week’s look at Kingston’s DataTraveler Locker+ thumb drive, I stressed the importance of keeping personal data safe. There are a multitude of reasons why you should take this seriously, but ...
If you think that encrypting your laptop’s hard drive will keep your data safe from prying eyes, you may want to think again, according to researchers at Princeton University. They’ve discovered a way ...
Storage manufacturer Seagate has announced new-design LaCie Mobile Drive and LaCie Mobile Drive Secure hard drives with encryption, and made from sustainable materials. Following its recent desktop ...
In this article, I will tell you how to lock your hard drive with a password using windows in-built feature BitLocker. This is a great way to protect your files from prying eyes and keep your system ...
Share on Facebook (opens in a new window) Share on X (opens in a new window) Share on Reddit (opens in a new window) Share on Hacker News (opens in a new window) Share on Flipboard (opens in a new ...
The rise of cloud storage has made traditional USB drives all but obsolete, but could there still be a reason to keep an ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...