Skip to main content

encryption

Rethinking Encryption

10/16/2009 - As information such as passwords and account numbers moves from computer to computer across the Internet, it is encrypted—jumbled into a non- comprehensible form. Unfortunately, attackers can intercept this encrypted data as they flow through the system or access encrypted data from where it sits in storage and use it maliciously. Cloud computing is becoming more and more common and will require changes in the way that data are protected.