Skip to content

Main Navigation

Gigaom Search
  • Menu

  • About Us
  • ResearchExpand
    • Cloud & Infrastructure
    • Data Infrastructure, AI & Analytics
    • Edge & Networking
    • Security & Risk
    • DevOps & Applications
  • Analysts
  • Search
  • Sign in
Become a Client

Research

Show filters Hide filters
Topics
Cloud & Infrastructure Data Infrastructure, AI & Analytics Edge & Networking Security & Risk DevOps & Applications Encryption
Products
Market Radar Key Criteria & Market Landscape TCO & Benchmark GigaBrief Solution Brief Business & Technology Impact Webinar Blog Podcast
Jonathan Vanian May 15, 2014 (Jun 10, 2020) -- Blog Post

Zix Corporation launches email encryption service for Google Apps customers

Email security company Zix Corporation just released a new email encryption service called GAME, which stands for Google Apps Message Encryption. The service works by encrypting emails sent to recipients outside of the Google cloud network.…

Read More
Cloud & Infrastructure, Data Infrastructure, AI & Analytics, Technology
David Meyer May 14, 2014 (Jun 10, 2020) -- Blog Post

Aiming for secure big data, ADVA puts line-side encryption into its 100G networking gear

The networking vendor is claiming an industry first with the encrypted version of its 100G Metro technology, which aims to handle large, fast-flowing amounts of data with as much security as it can muster.…

Read More
Data Infrastructure, AI & Analytics, Europe, Technology
Kevin Fitchard Apr 16, 2014 (Jun 10, 2020) -- Blog Post

Time Warner Cable bets big on easy and secure Wi-Fi, rolling out Hotspot 2.0 networkwide

TWC has launched the first large-scale implementation of Hotspot 2.0, which will make public Wi-Fi networks behave like cellular networks. You log into the network once and you'll be instantly connected wherever you go.…

Read More
Mobile, Technology
Jeff Roberts Apr 14, 2014 (Jun 10, 2020) -- Blog Post

Google may boost search results of sites that use encryption

Many websites' fate is tied to where to they appear in Google rankings. That's why it's significant that Google may one day give a boost to those that use encryption.…

Read More
Technology
Jeff Roberts Apr 11, 2014 (Jun 10, 2020) -- Blog Post

Report: NSA knew about Heartbleed bug and took advantage of it, but the NSA denies the charge

A new development in the Heartbleed bug story: Bloomberg reports that America's spy service knew about it and has been using it for two years.…

Read More
Technology
David Meyer Mar 19, 2014 (Jun 10, 2020) -- Blog Post

Twitter reportedly drops direct message encryption plan

Twitter(s twtr) has reportedly put on hold a plan to encrypt its users’ direct messages. The plan was mentioned in a New…

Read More
Mobile, Technology
Jeff Roberts Mar 10, 2014 (Jun 10, 2020) -- Blog Post

Snowden calls encryption “defense against the dark arts”

Average people are not going to use Tor and other tools used by the tech community, says Edward Snowden. That's why widespread encryption is our best hopes to counter mass government surveillance.…

Read More
Technology
David Meyer Mar 10, 2014 (Jun 10, 2020) -- Blog Post

“Merkel phone” security firm teams up with Vodafone on new Secure Call app

The app, which promises to protect voice communications, is part of a slew of new security products being pitched to privacy-conscious businesses in Europe.…

Read More
Europe, Mobile, Technology
Kevin Fitchard Mar 5, 2014 (Jun 10, 2020) -- Blog Post

FreedomPop starts selling an encrypted mobile phone

Capitalizing on the growing angst over privacy in today’s surveillance state, virtual operator FreedomPop has started selling a smartphone that routes all…

Read More
Mobile, Technology
David Meyer Feb 19, 2014 (Jun 10, 2020) -- Blog Post

Silent Circle gets its first telco distributor, as KPN prepares to offer encrypted communications

The strategic partnership is important for Silent Circle, as it promises to make the encrypted Skype rival much more usable by widening its pool of users.…

Read More
Europe, Mobile, Technology
Barb Darrow Jan 27, 2014 (Jun 10, 2020) -- Blog Post

As security woes bedevil IT, guess who’ll shoulder more of the load?

Relentless attempts to access critical corporate or personal data won't let up. What could change is who companies will rely on as their last line of defense: You and me.…

Read More
Cloud & Infrastructure, Technology
David Meyer Jan 10, 2014 (Jun 10, 2020) -- Blog Post

British pushed for weak encryption at birth of digital mobile telephony — report

Norway’s Aftenposten has published an interesting account of the decisions taken by those who were formulating GSM – the world’s most widely…

Read More
Europe, Mobile, Technology
Barb Darrow Jan 8, 2014 (Jun 10, 2020) -- Blog Post

If RSA was hoping NSA furor would fade away, it was mistaken

A half dozen security experts pull out of annual RSA gabfest slated to take place in San Francisco next month. Would-be speakers are protesting RSA's reported cooperation with NSA.…

Read More
Cloud & Infrastructure, Technology
David Meyer Jan 3, 2014 (Jun 10, 2020) -- Blog Post

NSA’s quantum ambitions revealed in Snowden documents

The NSA is trying to build a quantum computer in order to break today’s digital encryption and create new types of encryption,…

Read More
Data Infrastructure, AI & Analytics, Technology
David Meyer Dec 20, 2013 (Jun 10, 2020) -- Blog Post

Processors can (in theory at least) give up encryption keys through the noises they make

Strong encryption may still work, despite the best efforts of the NSA, but a new research paper suggests that clever audio analysis…

Read More
Mobile, Technology
David Meyer Dec 9, 2013 (Jun 9, 2020) -- Blog Post

Google catches French finance ministry pretending to be Google

The incident, which was probably a case of the French finance ministry going overboard in its efforts to monitor employee activities, provides a timely reminder of how certificates are the weak point in online security.…

Read More
Europe, Technology
David Meyer Nov 21, 2013 (Jun 9, 2020) -- Blog Post

Say hello to Safeplug, Pogoplug’s $49 Tor-in-a-box for anonymous surfing

The box takes a minute to set up and promises anonymity for all surfing done through the connected router. It may not prove quite that simple to use in reality, but it's certainly an intriguing and cost-effective privacy tool.…

Read More
Cloud & Infrastructure, Europe, Mobile, Technology
David Meyer Nov 21, 2013 (Jun 9, 2020) -- Blog Post

iPhones out in German parliament as parties opt for encrypted communications

Politicians from Germany’s two biggest parties are currently negotiating what their grand coalition will look like, and they’ve reportedly decided on at…

Read More
Europe, Mobile, Technology
David Meyer Nov 20, 2013 (Jun 9, 2020) -- Blog Post

Not Smart: LG TVs reportedly spy on attached hard drives and send data back unencrypted

LG’s Smart TVs may be reporting a tad too much information back to the company’s servers, according to a detailed and convincing…

Read More
Cloud & Infrastructure, Europe, Technology
David Meyer Nov 13, 2013 (Jun 9, 2020) -- Blog Post

Snowden’s legacy: The open web could soon be encrypted by default

You may be familiar with the "https" prefix that tells you your connection is secure. Well, get ready to see a lot more of it -- standards-makers have decided that HTTP version 2 will only work with such web addresses.…

Read More
Technology
David Meyer Oct 18, 2013 (Jun 9, 2020) -- Blog Post

No, Edward Snowden is not stupid – he says he no longer has a copy of the NSA files

Edward Snowden has given a rare interview to The New York Times, saying he never retained a copy of his leaked NSA…

Read More
Data Infrastructure, AI & Analytics, Europe, Technology
Jeff Roberts Oct 4, 2013 (Jun 9, 2020) -- Blog Post

NSA targets Tor: leaks show how US weakens the privacy tools it pays to build

The United States paid to build the Tor network, which provides a secure way to communicate for everyone, including the military and dissidents. Why, then, is it also trying to compromise it?…

Read More
Europe, Technology
Derrick Harris Sep 30, 2013 (Jun 9, 2020) -- Blog Post

Dataguise, a big data security startup, raises $13M

Startup Dataguise has closed a $13 million series B investment round “led by Toba Capital with additional capital coming from the investment…

Read More
Cloud & Infrastructure, Data Infrastructure, AI & Analytics
David Meyer Sep 30, 2013 (Jun 9, 2020) -- Blog Post

Silent Circle will “move on” from NSA-associated encryption standards, but is that necessary?

The secure communications firm will bring in default replacements for widely-used encryption standards that came out of the U.S. National Institute of Standards and Technology (NIST). However, at least one security expert thinks this may be "a trifle of an overreaction."…

Read More
Data Infrastructure, AI & Analytics, Technology

Posts navigation

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »

Stay on top of emerging trends impacting your industry with updates from our GigaOm Research Community.

Join Research Community
Gigaom
  • About Us
  • Analysts
  • Press Room
  • Contact
  • Twitter
  • Facebook
  • LinkedIn
  • RSS Feed
  • Newsletter
  • Privacy Policy
  • Terms of Service
  • © GigaOm All Rights Reserved 2021
This website uses cookies; by continuing you are a agreeing to our Privacy Policy Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

This is an necessary category.

Save & Accept