Encryption techniques News
July 12, 2017
IBM is poised to leap forward in cybersecurity with a refreshed z Systems mainframe built to handle pervasive encryption.
January 12, 2017
A new Google Cloud Key Management Service attempts to keep pace with AWS and Azure with an important feature for highly regulated industries and enterprises that operate on its cloud.
April 26, 2016
This week, NetScout launches a new optimization platform for test labs, Fortinet beefs up security, Cisco Talos weighs ransomware and Aqua Comms tests secure submarine cabling.
March 18, 2016
Roundup: Google pushes efforts on HTTPS, Certificate Transparency and more to safeguard the Web with encryption, while other tech firms are eyeing more, stronger encryption.
Encryption techniques Get Started
Bring yourself up to speed with our introductory content
In this excerpt from chapter five of 'Blockchain for Dummies,' author Tiana Laurence covers Ethereum, decentralized autonomous organizations and smart contracts. Continue Reading
Learn how to set up and run the new VMware vSphere 6.5 VM Encryption feature to improve security by bringing encryption to the hypervisor level. Continue Reading
As the internet of things gains traction, data protection is a must. Learn how three encryption methods can help secure the IoT-enabled workplace. Continue Reading
Evaluate Encryption techniques Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Bring your own encryption offerings for the cloud are more common now. Expert Ed Moyle discusses the benefits and drawback of BYOE and what to know before implementation. Continue Reading
With more employees bringing their own devices and network-connected objects -- such as keycard controls and energy monitoring systems -- the digital footprint of the internet of things is only increasing. Yet the security industry is starting to develop an identity of things strategy.
Manufacturing, healthcare and critical-infrastructure companies have long dealt with the identity of things. Supervisory control and data acquisition engineers may be able to teach CIOs and CISOs the best way to handle device identity management. Determining which devices should access a network is a daunting task, however, because device identity management can be context dependent. Some, such as mobile phones, should be linked to users; others, such as radio frequency ID tags on cargo containers, should be linked to physical objects; and still others, such as an MRI machine or a centrifuge, need to be treated as a critical asset. To deal with the influx of devices and the identity of things, companies need to address discovery, asset identification and provisioning.
As the U.S. presidential election nears, we caught up with Nathaniel Gleicher, the former director of cybersecurity policy at the National Security Council in the White House. Gleicher, who is currently the head of Illumio's cybersecurity strategy, spoke with Information Security magazine about the Shadow Brokers' cyberweapons dump, the importance of having visibility into networks that need to be protected and the challenges of the vulnerabilities equities process.Continue Reading
Cloud backup vendors Carbonite and Mozy vary in their levels of support, pricing, mobile access, security and local backups, as well as target customer base. Continue Reading
Manage Encryption techniques
Learn to apply best practices and optimize your operations.
The old security rules don't apply when moving workloads to the cloud. These cloud security tips will help you make the right decision. Continue Reading
Incorporate lessons learned from hypervisor virtualization and effectively navigate common concerns, such as user access controls and poisoned images, to secure containers. Continue Reading
Proper voice security in the network requires voice gateway isolation, patch protection, next-generation firewalls, traffic encryption and limiting certain VoIP features. Continue Reading
Problem Solve Encryption techniques Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Jon Callas explains how strong the Triple DES symmetric encryption algorithm actually is and offers guidance on how it compares to other widely used block ciphers. Continue Reading
Let's Encrypt domain validation certificates had some security issues. Expert Matthew Pascucci explains how DV certificates work and what the issues were. Continue Reading
Encryption algorithms using 1024-bit keys are no longer secure, due to the emergence of 'trapdoored' primes. Expert Michael Cobb explains how the encryption backdoor works. Continue Reading