<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Encryption</title> <atom:link href="https://www.iphere.com/tag/encryption/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Why Client-Side Encryption Is Critical For Cloud Privacy</title><link>https://www.iphere.com/why-client-side-encryption-is-critical-for-cloud-privacy</link> <comments>https://www.iphere.com/why-client-side-encryption-is-critical-for-cloud-privacy#comments</comments> <pubDate>Thu, 13 Mar 2014 02:15:06 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[ClientSide]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Critical]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Privacy]]></category> <guid
isPermaLink="false">http://www.iphere.com/why-client-side-encryption-is-critical-for-cloud-privacy</guid> <description><![CDATA[The only way to ensure privacy in the cloud era is to shift to a model in which the cloud customer controls encryption keys, not the cloud provider. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/why-client-side-encryption-is-critical-for-cloud-privacy/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>WAN Encryption Tops the Agenda After NSA Revelations</title><link>https://www.iphere.com/wan-encryption-tops-the-agenda-after-nsa-revelations</link> <comments>https://www.iphere.com/wan-encryption-tops-the-agenda-after-nsa-revelations#comments</comments> <pubDate>Thu, 26 Sep 2013 20:17:33 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[After]]></category> <category><![CDATA[Agenda]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Revelations]]></category> <category><![CDATA[Tops]]></category> <guid
isPermaLink="false">http://www.iphere.com/wan-encryption-tops-the-agenda-after-nsa-revelations</guid> <description><![CDATA[Whatever trust customers had in the security of WAN connections from service providers is gone. Encrypt now, and consider less-expensive Internet connections instead. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/wan-encryption-tops-the-agenda-after-nsa-revelations/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Encryption can’t protect your data while you’re logged in</title><link>https://www.iphere.com/encryption-can%e2%80%99t-protect-your-data-while-you%e2%80%99re-logged-in</link> <comments>https://www.iphere.com/encryption-can%e2%80%99t-protect-your-data-while-you%e2%80%99re-logged-in#comments</comments> <pubDate>Sun, 23 Jun 2013 14:16:17 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[can’t]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[logged]]></category> <category><![CDATA[Protect]]></category> <category><![CDATA[you’re]]></category> <guid
isPermaLink="false">http://www.iphere.com/encryption-can%e2%80%99t-protect-your-data-while-you%e2%80%99re-logged-in</guid> <description><![CDATA[You carry a lot of data and sensitive information on your laptop, tablet, and smartphone. The standard method of protecting that information from prying eyes is to encrypt it, rendering the data inaccessible. But with most encryption software, that information becomes accessible the moment you log in to the device as a matter of convenience. [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/encryption-can%e2%80%99t-protect-your-data-while-you%e2%80%99re-logged-in/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Best Use of Encryption You Never Considered</title><link>https://www.iphere.com/best-use-of-encryption-you-never-considered</link> <comments>https://www.iphere.com/best-use-of-encryption-you-never-considered#comments</comments> <pubDate>Tue, 04 Dec 2012 20:17:56 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Best]]></category> <category><![CDATA[Considered]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Never]]></category> <guid
isPermaLink="false">http://www.iphere.com/best-use-of-encryption-you-never-considered</guid> <description><![CDATA[Got e-discovery, data destruction or outdated hardware woes? Digital shredding may be the solution &#8212; and it can bolster the business case for encrypting data. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/best-use-of-encryption-you-never-considered/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Porticor Beefs Up Cloud Security with Split-Key Encryption</title><link>https://www.iphere.com/porticor-beefs-up-cloud-security-with-split-key-encryption</link> <comments>https://www.iphere.com/porticor-beefs-up-cloud-security-with-split-key-encryption#comments</comments> <pubDate>Wed, 31 Oct 2012 20:14:01 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Beefs]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Porticor]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[SplitKey]]></category> <guid
isPermaLink="false">http://www.iphere.com/porticor-beefs-up-cloud-security-with-split-key-encryption</guid> <description><![CDATA[Porticor&#8217;s Virtual Private Data service encrypts information stored in private and public clouds, and uses homomorphic encryption techniques to protect master keys. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/porticor-beefs-up-cloud-security-with-split-key-encryption/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Calculating the Cost of Full Disk Encryption</title><link>https://www.iphere.com/calculating-the-cost-of-full-disk-encryption</link> <comments>https://www.iphere.com/calculating-the-cost-of-full-disk-encryption#comments</comments> <pubDate>Thu, 30 Aug 2012 20:13:45 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Calculating]]></category> <category><![CDATA[Cost]]></category> <category><![CDATA[Disk]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Full]]></category> <guid
isPermaLink="false">http://www.iphere.com/calculating-the-cost-of-full-disk-encryption</guid> <description><![CDATA[The price of FDE goes beyond hardware and software&#8211;but according to a recent study, the benefits far outweigh the costs. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/calculating-the-cost-of-full-disk-encryption/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Certes Unveils Cloud Encryption Virtual Appliance</title><link>https://www.iphere.com/certes-unveils-cloud-encryption-virtual-appliance</link> <comments>https://www.iphere.com/certes-unveils-cloud-encryption-virtual-appliance#comments</comments> <pubDate>Tue, 24 Apr 2012 14:19:50 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Appliance]]></category> <category><![CDATA[Certes]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Unveils]]></category> <category><![CDATA[Virtual]]></category> <guid
isPermaLink="false">http://www.iphere.com/certes-unveils-cloud-encryption-virtual-appliance</guid> <description><![CDATA[Concern about the security of their cloud-based data is a big issue for enterprises. A number of technology companies, now joined by Certes, are trying to allay customer concerns about data security by giving them control of the keys that protect their data in the cloud. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/certes-unveils-cloud-encryption-virtual-appliance/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>AppSense Unveils Smartphone Encryption</title><link>https://www.iphere.com/appsense-unveils-smartphone-encryption</link> <comments>https://www.iphere.com/appsense-unveils-smartphone-encryption#comments</comments> <pubDate>Wed, 22 Feb 2012 14:23:40 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[AppSense]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Smartphone]]></category> <category><![CDATA[Unveils]]></category> <guid
isPermaLink="false">http://www.iphere.com/appsense-unveils-smartphone-encryption</guid> <description><![CDATA[DataLocker, which will enable smartphone users to encrypt sensitive information in personal cloud services like Dropbox, is the first product to come out of the new research arm created by virtualization technology provider AppSense. Intended to create new computing technologies geared at both end users and IT, the focus of AppSense Labs will be &#8220;to [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/appsense-unveils-smartphone-encryption/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Encryption, Data-Centric Approach Needed To Secure Cloud, Mobile Users</title><link>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users</link> <comments>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users#comments</comments> <pubDate>Wed, 08 Feb 2012 20:13:59 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Approach]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[DataCentric]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Needed]]></category> <category><![CDATA[Secure]]></category> <category><![CDATA[users]]></category> <guid
isPermaLink="false">http://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users</guid> <description><![CDATA[The ever-growing mobile workforce with its head in the cloud has created what seems like an endless list of IT challenges to overcome, and with anywhere, anytime access to information a necessity for many enterprises, the new IT world is having an impact on the kind of encryption enterprises need to protect their sensitive and [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/encryption-data-centric-approach-needed-to-secure-cloud-mobile-users/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Encryption Key To Evolving Data-Centric Security Model</title><link>https://www.iphere.com/encryption-key-to-evolving-data-centric-security-model</link> <comments>https://www.iphere.com/encryption-key-to-evolving-data-centric-security-model#comments</comments> <pubDate>Tue, 07 Feb 2012 20:12:43 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[DataCentric]]></category> <category><![CDATA[Encryption]]></category> <category><![CDATA[Evolving]]></category> <category><![CDATA[Model]]></category> <category><![CDATA[Security]]></category> <guid
isPermaLink="false">http://www.iphere.com/encryption-key-to-evolving-data-centric-security-model</guid> <description><![CDATA[With data access no longer restricted to the four walls of the enterprise (or branch) and 9-to-5 business hours, enterprises that have traditionally relied on a perimeter-based approach to security are now seeing the benefits of a data-centric approach. Data encryption is paving the way for the transition to data-centric security methods, according to a [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/encryption-key-to-evolving-data-centric-security-model/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>