Safeguarding stored data
W. Curtis Preston, the author of "The Storage Security Handbook" and "Unix Backup & Recovery," begins with an overview of the security problems that companies are trying to address with encryption and authentication systems. He then explains the three basic ways to encrypt sensitive data: encryption at the source, encryption with a backup application and hardware encryption.
At net-security.bitpipe.com, free registration required.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.