I was considering purchasing hard drive encryption software for our consultants' laptops in case they were lost or stolen. Does anyone have any recommendations or tips on what to look for in a good ...
The world’s six largest computer drive makers Tuesday published the final specifications (download PDF) for a single, full-disk encryption standard that can be used across all hard disk drives, solid ...
HELSINKI--(BUSINESS WIRE)--Jetico, long-trusted pioneer in data protection, has announced the release of its Mac drive encryption software. Expanding on many years of Windows support, BestCrypt Volume ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...
In last week’s look at Kingston’s DataTraveler Locker+ thumb drive, I stressed the importance of keeping personal data safe. There are a multitude of reasons why you should take this seriously, but ...
The rise of cloud storage has made traditional USB drives all but obsolete, but could there still be a reason to keep an ...
Now that the capacities of small form-factor drives have hit hundreds of gigabytes, just about any corporate database can easily fit on a laptop. That affordable capacity gives users the opportunity ...
Trusted Computing Group's Opal spec for interoperable, self-encrypting drives isn't complete, but it's a great start If you’re not already a huge fan of the Trusted Computing Group, you should be. It ...
Flash drives, or thumb drives, are portable devices that provide easy access to flash storage. Commonly used to take backups, transfer files between devices, and install operating system images, these ...
Hitachi Global Storage Technologies today announced availability of what it is touting as the highest-capacity, highest-performing notebook hard drive. The Travelstar 7K200 doubles the capacity of its ...
Companies relying on self-encrypting drives (SEDs) to secure data stored on their employees’ laptops should be aware that this technology is not immune to attack and should carefully consider whether ...