By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Disk and file encryption tools News
October 18, 2017
Researchers disclosed the ROCA RSA vulnerability as a dangerous flaw in the cryptographic code of Infineon chips that could undermine encryption key security for a number of devices.
October 13, 2017
News roundup: The DOJ calls for 'responsible encryption' to comply with court orders. Plus, there's more bad cybersecurity news for banks, and Accenture data in AWS gets exposed.
September 29, 2017
What will it take for people to use encryption software as a matter of course? A Boston startup believes it's got the answer.
April 07, 2017
News Roundup: 'Hand-to-hand' combat in State Department hack, APT29 has a stealth backdoor, the creator of the internet backs strong encryption, and more.
Disk and file encryption tools Get Started
Bring yourself up to speed with our introductory content
In this excerpt from chapter three of Computer and Information Security Handbook, author John R. Vacca reviews the basics of cryptography. Continue Reading
Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time. Continue Reading
Data protection does not have a one-size-fits-all solution. Understand which encryption tools and methods best fit different scenarios. Continue Reading
Evaluate Disk and file encryption tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Need to transfer files within headquarters or between branches? Managed file transfer tools now offer some interesting new features. Continue Reading
Google Cloud KMS is a new encryption key management service available for Google customers. Expert Matthew Pascucci discusses how this service works and its security benefits. Continue Reading
Many enterprises apply big data techniques to their security systems. But are these methods secure? Expert John Burke explains some of the efforts to secure big data analysis. Continue Reading
Manage Disk and file encryption tools
Learn to apply best practices and optimize your operations.
In this excerpt from chapter three of Safety of Web Applications, author Eric Quinton discusses symmetric and asymmetric encryption. Continue Reading
Companies and government agencies handling criminal justice information need to comply with CJIS Security Policy. Expert Michael Cobb explains the cryptographic modules to use. Continue Reading
Android device security is getting a boost with its newest version, Android N. Expert Michael Cobb explains the effects on enterprise users, and the changes in encryption. Continue Reading
Problem Solve Disk and file encryption tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A cryptographic weakness was discovered in the Telerik web UI. Expert Judith Myerson alerts readers about this weakness and the alternative options for companies to explore. Continue Reading
Flaws in WhatsApp and Telegram, popular messaging services, enable attackers to break encryption and take over accounts. Expert Michael Cobb explains how the attacks work. Continue Reading
Researchers created WannaCry decryptor tools after the outbreak of the ransomware. Expert Matthew Pascucci explains how the tools work and if they work on other ransomware. Continue Reading