With large capacity USB thumb drives it's easy to put massive amounts of sensitive data in an easily lost package. Regulations can make the cost of losing health or financial data quite severe, ...
Encrypted or locked-down USB storage devices do not have mainstream appeal yet, but industry experts say increased regulations are driving the uptake of such devices. Graham Titterington, principal ...
A USB drive that stores encrypted data. The encryption may be performed by third-party encryption software or the software that comes with the drive. In either case, the software is configured to ...
Please Note: Blog posts are not selected, edited or screened by Seeking Alpha editors. There was an era when computer users barely had any physical medium to move their files from one computer to ...
If you travel with sensitive files, Lenovo’s ThinkPad USB Secure Hard Drive strikes me as an excellent approach to security. There are many secure external hard drives, but I particularly like the ...
LOS ALTOS, Calif., Nov. 3, 2009 IronKey, maker of the worlds most secure flash drive, today announced the launch of its D200 devices, providing more choice for consumers, government and enterprise ...
Can a single cable redefine both charging speed and device security? Plugable believes so with its newest lineup of high-wattage, charge-only USB-C cables. As concerns about data theft at public ...
If you’re looking for a encrypted, portable OS that can be securely loaded on any computer, Secure-K may be the answer. Also if you’re afraid of hackers wearing hoodies in darkened rooms and find joy ...
Infineon’s ID Key S USB integrates a security controller and USB bridge controller in one package, supporting a range of USB and USB/NFC token applications. Built on a high-assurance security ...
The introduction of USB-C to devices has brought both benefits and hardships. The new USB standard has allowed makers and devices to standardized connections, provide lightning-fast power delivery, ...
We know conventional passwords aren’t the most secure, especially if they’re re-used across multiple sites. Biometrics are often a quicker and more effective approach, but most older devices don’t ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results