By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Data encryption techniques News
January 14, 2010
Research firm analyzes says end-to-end encryption is most practical means of thwarting card fraud
August 13, 2009
Many financial institutions are already meeting new law's requirements for protecting state residents' personal information, but some have work to do.
August 11, 2009
Payment processor will promote VeriFone's technology for end-to-end encryption of payment card data to its merchants.
June 15, 2009
Download a number of the compelling presentations from the 2009 Financial Information Security Decisions conference.
Evaluate Data encryption techniques Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
'Bring your own key' services let customers hold onto their encryption keys, but is it really more secure? Expert Dan Sullivan explains. Continue Reading
With PCI DSS and other compliance requirements, organizations are looking for surefire solutions to protect payment card and other sensitive data. Tokenization and end-to-end encryption have emerged as promising technologies, but as Dave Shackleford... Continue Reading
Manage Data encryption techniques
Learn to apply best practices and optimize your operations.
Key management is essential to a successful encryption project. In this tip, expert Randy Nash explains the challenges financial organizations face when implementing key management and some of the best practices to overcome them. Continue Reading
Encryption is a necessary security tool in financial companies, but government mandates limit how much data you can encrypt and where it can be deployed. Learn how to determine what's the best plan for encryption at your financial services ... Continue Reading
Problem Solve Data encryption techniques Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Jon Callas explains how strong the Triple DES symmetric encryption algorithm actually is and offers guidance on how it compares to other widely used block ciphers. Continue Reading
Financial-services firms are among the many organizations that have reported losing backup tapes with sensitive customer data. In this tip, W. Curtis Preston explains how to secure data backup and the pros and cons associated with the three basic ... Continue Reading
Financial-services firms looking to use encryption for secure communications with business partners can run into many complications because of all the encryption systems and standards. In this tip, Randall Gamby explains the various components that ... Continue Reading