New & Notable
Disk Encryption and File Encryption News
July 02, 2014
Heartbleed exposed a number of long-standing issues at OpenSSL, but the open source encryption project has laid out plans to improve the organization.
June 10, 2014
CryptoLocker's infrastructure may be down for now, but experts say the easy money that can be made from ransomware means it is here to stay.
May 30, 2014
For enterprises, the sudden shuttering of the disk-encryption utility TrueCrypt highlights the risk of using open source security tools.
April 10, 2014
Video: Cryptography Research Inc. president Paul Kocher details how the ongoing NSA encryption-cracking scandal affects trusted crypto algorithms.
Disk Encryption and File Encryption Get Started
Bring yourself up to speed with our introductory content
In this CISSP Essentials Security School video presentation, Shon Harris details the first half of the Security Architecture and Design domain, including system components, system protection, CUP and memory management and more. Continue Reading
In this CISSP Essentials Security School presentation, Shon Harris discusses the topics of security models, assurance evaluation and certification/accreditation in the Security Architecture and Design domain. Continue Reading
Spotlight article: Shon Harris discusses the main topics in the CISSP domain on security architecture and design, highlighting formal architectures, system architectures, security models and system evaluation. Continue Reading
Evaluate Disk Encryption and File Encryption Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Is it time to make the move to the SHA-2 algorithm? Application security expert Michael Cobb discusses and offers tips to ease the transition. Continue Reading
Test your knowledge of the CISSP exam's Security Architecture and Design domain by taking this practice quiz that covers topics including system architecture, security models and more. Continue Reading
Encryption deployment can reduce the impact of a security breach. But the complexity of key management prevents some companies from wider adoption. Continue Reading
Manage Disk Encryption and File Encryption
Learn to apply best practices and optimize your operations.
Application security expert Michael Cobb explains how quantum key distribution works, and whether it is a viable method of improving the security of smartphones and tablets. Continue Reading
Test your knowledge of the CISSP exam's Cryptography Domain by taking this practice quiz, which covers topics including public and private keys, encryption algorithms, digital certificates and more. Continue Reading
Open source needs some sort of body that promotes secure architectural design and coding, says Robert Richardson. Continue Reading
Problem Solve Disk Encryption and File Encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In light of the Adobe password breach, expert Michele Chubirka explains the difference between encryption and hashing when storing passwords. Continue Reading
The future of SSL is SHA-2. Security expert Michael Cobb explains why SHA-1 poses an increasing danger and what the transition entails. Continue Reading
Is elliptic curve cryptography more effective than RSA or Diffie-Hellman? Security expert Michael Cobb details the pros and cons of ECC. Continue Reading