The Ultimate Guide to Encryption
2024 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Expert columns
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
Last month
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
Last month
By Jason Duerden of SentinelOne
Overcoming the data challenges associated with gen AI d...
Last month
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Mon, 25th Mar 2024
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
Mon, 25th Mar 2024
More expert columns
By George Moawad of Genetec
A proactive approach to cyber and physical security
Wed, 13th Mar 2024
By Andrew Wilson of Senetas
Encryption everywhere: Senetas brings military grade en...
Wed, 28th Feb 2024
By George Dragatsis of Hitachi Vantara
Simplifying the security challenge of operating in mult...
Thu, 8th Feb 2024
By Michal Lewy Harush of Aqua Security
How the cloud security landscape will evolve in 2024
Fri, 2nd Feb 2024
By Jonathan Hatchuel of Gigamon
Unveiling hidden menaces: Hey, threat actors… we see yo...
Tue, 12th Dec 2023
By Sam Manjarres of WatchGuard Technologies
Getting people to trust zero trust - Watchguard Technol...
Fri, 29th Sep 2023
Recent news
About Firewall
Ransomware attack costs on Australian firms soar, revea...
Yesterday
About Cloud Services
Grok Academy invites NZ students to third annual Cyber ...
Yesterday
About Cloud Services
New Relic report uncovers ongoing trends in Java adopti...
Yesterday
About Cloud Services
Dropbox unveils new features in Australia & New Zealand
3 days ago
About Voice over Internet Protocol
Dropbox unveils new features for remote work, enhances ...
Last week
More news
About Government
New UK cybersecurity law takes effect amid evolving thr...
Last week
About Ransomware
Ransomware threats escalating in Southeast Asia – repor...
Last week
About Government
Smart card market projected to reach $24.2bn by 2034
Last week
About Cloud Services
HPE Aruba launches high-capacity Wi-Fi 7 access points
Last week
About Ransomware
Kaspersky illuminates LockBit ransomware group's advanc...
Last month
Even more news
About Ransomware
Cado Security unmasks Cerber ransomware threat to Confl...
Last month
About Cloud Services
Samsung unveils rugged Galaxy XCover7 & Tab Active5
Last month
About Software-as-a-Service
Arrow Electronics unveils expansive cloud backup servic...
Last month
About Government
Cohesity collaborates with Intel to bolster AI-powered ...
Last month
About Cloud Services
Malwarebytes launches free Digital Footprint Portal to ...
Last month
Job moves
Move at IBM
Trellix appoints Joseph Tal to Lead Advanced Research C...
Tue, 14th Mar 2023
Move at IBM
QuSecure appoints Lisa Hammitt as First Independent Dir...
Fri, 17th Feb 2023
Move at Aras
NTT Research appoints Takashi Goto as Head of its Tech...
Fri, 23rd Sep 2022
Move at VMware
Kroll Ontrack aims to double NZ resellers by 2013
Tue, 4th Sep 2012
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Cloud Services, Data Protection, and Malware.
Powered by