Some people can criticize in such a nice way. After last month’s newsletter about Voltage Technology and its Identity-Based Encryption software (see links below) one very nice reader wrote to say, ...
COMMENTARY--A 1991 college computer-networking class almost stymied my vocational momentum. The professor, a genuinely keen and knowledgeable fellow, spent much time explaining the most important ...
The effective management of public key infrastructure (PKI) for enterprise IT teams is becoming more complex and cumbersome. The increasing number of enterprise users with their desktops, laptops, ...
Public-key infrastructure technology was once so cool. Its combination of encryption, digital certificates and other technologies appeared to be a foolproof way to ensure the security of electronic ...
If you are an IT manager, how many calls do you get every Monday, or on the day after a software update, from employees at your organization asking you to assist with a forgotten password? The answer ...
The iKey 2000 product from Rainbow Technologies is similar in concept to the iKey 1000, but it offers additional functionality, including 2048-bit encryption and a Philips 5032 cryptographic ...