The Ultimate Guide to Encryption
2024 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Expert columns
By Karthik Sj of LogicMonitor
AI's new frontier: bringing intelligence to the data so...
This month
By Annexa
Myths and misconceptions about cloud ERP debunked
This month
By Dakshitaa Babu of SquareX
Why data still leaks through enterprise DLP solutions
Last month
By Gigamon
Network visibility: How to improve it and why it will i...
Last month
By Andrew Wilson of Senetas
Australia’s National Cybersecurity Act races against te...
Last month
More expert columns
By Matthew Lowe of LogRhythm
Under the knife: Healthcare sector grappling with risin...
Fri, 3rd May 2024
By Jonathan Tanner of Barracuda Networks
The remote desktop tools most targeted by attackers in ...
Thu, 2nd May 2024
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
Thu, 4th Apr 2024
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
Wed, 3rd Apr 2024
By Jason Duerden of SentinelOne
Overcoming the data challenges associated with gen AI d...
Wed, 3rd Apr 2024
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Mon, 25th Mar 2024
Top players
Recent news
About Cloud Services
Ecommpay partners with Mastercard to launch Click to Pa...
4 days ago
About Antivirus
Enhanced cybersecurity measures urged by Software@Scale
4 days ago
About Cloud Services
Google Cloud releases air-gapped appliance for harsh en...
4 days ago
About Utilities
Ransomware recovery costs soar in energy & water sector...
5 days ago
About Cloud Services
Eclypses launches Secure MTE data protection on AWS Mar...
Last week
More news
About Cloud Services
HID & Inner Range extend partnership for wallet-enabled...
This month
About Productivity
Tolley launches Tolley+ AI to transform UK tax practice
This month
About Software-as-a-Service
Ennoventure enhances leadership team to drive strategic...
This month
About Aggregated data
Figma launches AI-driven tools with strong privacy focu...
This month
About Public Sector
Google Cloud & Gulf Edge join forces for Thai cloud ser...
This month
Even more news
About Government
Apricorn earns ISO 9001:2015 certification for quality ...
Last month
About Ransomware
Adlumin enhances ransomware prevention with new exfiltr...
Last month
About Cloud Services
Scality named leader in 2024 GigaOm Radar for object st...
Last month
About Passwords
Study reveals 45% of passwords crackable within a minut...
Last month
About Software Updates
Businesses underprepared as data breaches soar 25% in 2...
Last month
Job moves
Move at IBM
Trellix appoints Joseph Tal to Lead Advanced Research C...
Tue, 14th Mar 2023
Move at IBM
QuSecure appoints Lisa Hammitt as First Independent Dir...
Fri, 17th Feb 2023
Move at Aras
NTT Research appoints Takashi Goto as Head of its Tech...
Fri, 23rd Sep 2022
Move at VMware
Kroll Ontrack aims to double NZ resellers by 2013
Tue, 4th Sep 2012
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Malware, Data Protection, and Firewalls.
Powered by