New & Notable
Disk Encryption and File Encryption News
November 21, 2014
News roundup: As the industry responds to growing demand for end-to-end Internet encryption, some fear unintended consequences. Plus: Black hats wanted; Windows Phone survives Pwn2Own; webcam spying resurgence.
July 02, 2014
Heartbleed exposed a number of long-standing issues at OpenSSL, but the open source encryption project has laid out plans to improve the organization.
June 10, 2014
CryptoLocker's infrastructure may be down for now, but experts say the easy money that can be made from ransomware means it is here to stay.
May 30, 2014
For enterprises, the sudden shuttering of the disk-encryption utility TrueCrypt highlights the risk of using open source security tools.
Disk Encryption and File Encryption Get Started
Bring yourself up to speed with our introductory content
Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties. Continue Reading
The Advanced Encryption Standard or AES is a symmetric block cipher used by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data. Continue Reading
The Data Encryption Standard (DES) is an outdated symmetric-key method of data encryption. Continue Reading
Evaluate Disk Encryption and File Encryption Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise. Continue Reading
Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization. Continue Reading
Readers vote on the best encryption products of 2014. Continue Reading
Manage Disk Encryption and File Encryption
Learn to apply best practices and optimize your operations.
Is it time to make the move to the SHA-2 algorithm? Application security expert Michael Cobb discusses and offers tips to ease the transition. Continue Reading
Application security expert Michael Cobb explains how quantum key distribution works, and whether it is a viable method of improving the security of smartphones and tablets. Continue Reading
Test your knowledge of the CISSP exam's Cryptography Domain by taking this practice quiz, which covers topics including public and private keys, encryption algorithms, digital certificates and more. Continue Reading
Problem Solve Disk Encryption and File Encryption Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In light of the Adobe password breach, expert Michele Chubirka explains the difference between encryption and hashing when storing passwords. Continue Reading
Video: In this AxCrypt tutorial, Keith Barker of CBT Nuggets shows how to use AxCrypt, a free, open source tool for quick, simple file encryption. Continue Reading
The future of SSL is SHA-2. Security expert Michael Cobb explains why SHA-1 poses an increasing danger and what the transition entails. Continue Reading