The Ultimate Guide to Encryption
2024 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Expert columns
By George Moawad of Genetec
A proactive approach to cyber and physical security
This month
By Andrew Wilson of Senetas
Encryption everywhere: Senetas brings military grade en...
Last month
By George Dragatsis of Hitachi Vantara
Simplifying the security challenge of operating in mult...
Last month
By Michal Lewy Harush of Aqua Security
How the cloud security landscape will evolve in 2024
Last month
By Jonathan Hatchuel of Gigamon
Unveiling hidden menaces: Hey, threat actors… we see yo...
Tue, 12th Dec 2023
More expert columns
By Sam Manjarres of WatchGuard Technologies
Getting people to trust zero trust - Watchguard Technol...
Fri, 29th Sep 2023
By Michael Dickman of Gigamon
How plaintext visibility eliminates blind spots across ...
Tue, 26th Sep 2023
By Ben Rose of Binance
The most slept-on and unseen sector in New Zealand
Mon, 31st Jul 2023
By Suchita Gupta
Blockchain's Profound Impact on Automotive Industry
Wed, 31st May 2023
Recent news
About Malware
World Backup Day highlights need for robust data protec...
Yesterday
About Data Protection
Rising ransomware attacks amplify World Backup Day's im...
5 days ago
About iOS
Pegasus spyware could target iOS devices, says Group-IB
Last week
About Machine learning
Kallipr's Captis S2 Pulse to revolutionise remote monit...
This month
About Data breach
Retail, finance sectors face consumer shift over cyber ...
This month
More news
About Geofencing
Trustifi enhances cybersecurity in Australia with new g...
This month
About Data Protection
Sage reveals AI-powered assistant for accounting & fina...
This month
About Government
LockBit ransomware gang dismantled by global task force
Last month
About Biometrics
IDEMIA teams with Microsoft for Entra Verified ID onboa...
Last month
About Transparency
i-PRO shares key tips on data privacy protection
Last month
Even more news
About Data Privacy
Temu achieves MASA certification for its mobile app sec...
Last month
About Cyber Criminal
Australian healthcare plagued with rising rate of cyber...
Last month
About Storage
MEGA selects SugarCRM to optimise sales & enhance user ...
Last month
About Data Protection
New IBM & NCS partnership to fortify Singapore's data
Last month
About Cloud Services
Data Privacy Day: Experts call for essential adaptation...
Fri, 26th Jan 2024
Job moves
Move at IBM
Trellix appoints Joseph Tal to Lead Advanced Research C...
Tue, 14th Mar 2023
Move at IBM
QuSecure appoints Lisa Hammitt as First Independent Dir...
Fri, 17th Feb 2023
Move at Aras
NTT Research appoints Takashi Goto as Head of its Tech...
Fri, 23rd Sep 2022
Move at VMware
Kroll Ontrack aims to double NZ resellers by 2013
Tue, 4th Sep 2012
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Data Protection, Malware, and Cloud Services.
Powered by