The Ultimate Guide to Encryption
2024 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Expert columns
By Matthew Lowe of LogRhythm
Under the knife: Healthcare sector grappling with risin...
2 days ago
By Jonathan Tanner of Barracuda Networks, Inc.
The remote desktop tools most targeted by attackers in ...
3 days ago
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
Last month
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
Last month
By Jason Duerden of SentinelOne
Overcoming the data challenges associated with gen AI d...
Last month
More expert columns
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Mon, 25th Mar 2024
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
Mon, 25th Mar 2024
By George Moawad of Genetec
A proactive approach to cyber and physical security
Wed, 13th Mar 2024
By Andrew Wilson of Senetas
Encryption everywhere: Senetas brings military grade en...
Wed, 28th Feb 2024
By George Dragatsis of Hitachi Vantara
Simplifying the security challenge of operating in mult...
Thu, 8th Feb 2024
By Michal Lewy Harush of Aqua Security
How the cloud security landscape will evolve in 2024
Fri, 2nd Feb 2024
Recent news
About PC Hardware
Senetas lands record-breaking Middle Eastern encryption...
3 days ago
About Firewall
Ransomware attack costs on Australian firms soar, revea...
4 days ago
About Cloud Services
Grok Academy invites NZ students to third annual Cyber ...
4 days ago
About Cloud Services
New Relic report uncovers ongoing trends in Java adopti...
4 days ago
About Cloud Services
Dropbox unveils new features in Australia & New Zealand
6 days ago
More news
About Voice over Internet Protocol
Dropbox unveils new features for remote work, enhances ...
Last week
About Government
New UK cybersecurity law takes effect amid evolving thr...
Last week
About Ransomware
Ransomware threats escalating in Southeast Asia – repor...
Last week
About Government
Smart card market projected to reach $24.2bn by 2034
Last week
About Cloud Services
HPE Aruba launches high-capacity Wi-Fi 7 access points
Last week
Even more news
About Ransomware
Kaspersky illuminates LockBit ransomware group's advanc...
Last month
About Ransomware
Cado Security unmasks Cerber ransomware threat to Confl...
Last month
About Cloud Services
Samsung unveils rugged Galaxy XCover7 & Tab Active5
Last month
About Software-as-a-Service
Arrow Electronics unveils expansive cloud backup servic...
Last month
About Government
Cohesity collaborates with Intel to bolster AI-powered ...
Last month
Job moves
Move at IBM
Trellix appoints Joseph Tal to Lead Advanced Research C...
Tue, 14th Mar 2023
Move at IBM
QuSecure appoints Lisa Hammitt as First Independent Dir...
Fri, 17th Feb 2023
Move at Aras
NTT Research appoints Takashi Goto as Head of its Tech...
Fri, 23rd Sep 2022
Move at VMware
Kroll Ontrack aims to double NZ resellers by 2013
Tue, 4th Sep 2012
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Cloud Services, Data Protection, and Malware.
Powered by