FEATURED HOW-TOS ARTICLE
20 January
The past year has seen a record number of companies losing laptops containing confidential, often unencrypted, data. IT managers have it their power to protect that data, but what encryption technology should they be following? TPM or an alternative? We run our eye over the options.