New & Notable


The fundamentals of FDE: Procuring full-disk encryption software

Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise.


KeePass tutorial: Using the free password-management tool

Video: Learn how to use KeePass, the free password-management tool that can offer cash-strapped enterprises a way to help employees encrypt and secure their work-related passwords.


Non-traditional employee recruitment may remedy security hiring woes

With viable job and training opportunities finally emerging, the time is now for CISOs and hiring managers to boost infosec's ranks with non-traditional candidates.


How will Canadian anti-spam legislation affect commercial email?

The Canadian anti-spam legislation applies to many enterprises. Expert Mike Chapple explains what the effects of CASL are for businesses.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

  • Get Started

    PKI (public key infrastructure)

    A public key infrastructure (PKI) supports the distribution and identification of public encryption keys, enabling users and computers to both securely exchange data over networks such as the Internet and verify the identity of the other party.

  • Get Started

    Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files.

  • Get Started


    Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.

View All Get Started


Videos, Podcasts and Photo Stories

Sections from across SearchSecurity

  • News

    View All
  • Denial of Service (DoS) Attack Prevention

    DDoS attack sizes continue to grow as SSDP targeted

    New research shows that average DDoS attacks are growing larger and more prevalent as attackers have moved to exploit SSDP, the latest protocol to be abused for its amplification factor.

  • Disk Encryption and File Encryption

    Despite demand, Internet encryption has drawbacks

    News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.

  • Identity Theft and Data Security Breaches

    That was easy: Cyberinsurance may cover Staples breach

    A new report links the Staples security breach to an intrusion at craft retailer Michaels. Meanwhile, Staples confirmed it had purchased cyberinsurace to cover the still unknown cost of its breach.