If you’re like me, you’ve taken to carrying important data on USB sticks or flash drives. They’re handy, you can use them on any PC, and with built-in encryption even if you lost them it was no big ...
DataLocker, Inc., a leader in hardware-encrypted data protection, today announced that its flagship Sentry 5 encrypted USB ...
Privacy and security concerns are becoming more commonplace as data sharing becomes more commonplace. Here's how to lock down ...
Fountain Valley, CA -- September 28, 2011 -- Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced ...
The USB-based memory devices referred to as USB flash drives, “thumb drives” or “pen drives” have revolutionized the way data storage and portability have evolved. Since their inception in 2000, ...
What would happen if one of your coworkers lost a USB flash drive containing extremely sensitive customer information? Would it cause panic because of the potential for data exposure and massive fines ...
Cybercriminals are constantly finding new ways to steal your data. As people become more aware of common threats like phishing links, fake websites, fraudulent emails and impersonation scams, ...
Hardware There are a surprising number of programs designed to randomly kill processes on your computer until it crashes—or you wimp out SSDs Micron isn't done with consumer SSDs after all, unveiling ...
Dear CIOs, CTOs and IT professionals, A few weeks ago, the U.S. military wisely instituted a short-term ban on the use of USB drives after a worm infiltrated Army networks when a user plugged in a USB ...
The DataTraveler Secure USB 2.0 flash drives feature capacities up to 8 Gbytes and 256-bit Advanced Encryption Standard (AES) hardware-based encryption. The drives operate from 0 to 60 C and have data ...
Security officials are issuing USB flash drives to workers in the state of Washington’s Division of Child Support as part of a new security procedure established to eliminate the use of non-approved ...