New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Disk and file encryption tools News
January 26, 2018
Sen. Ron Wyden challenged the FBI encryption argument and asked the FBI director to be transparent about claims that lawful access could be provided securely.
January 24, 2018
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the FBI's continued criticism of encrypted devices and the risks of vendor-created backdoor access points.
November 01, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the recent push from law enforcement officials for responsible encryption and what that may mean.
October 31, 2017
"Three may keep a Secret, if two of them are dead." So wrote Benjamin Franklin, in Poor Richard's Almanack, in 1735. Franklin knew a thing or two about secrets, as well as about cryptography, given ...
Disk and file encryption tools Get Started
Bring yourself up to speed with our introductory content
Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them. Continue Reading
In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key. Continue Reading
Going dark describes a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel to a private, encrypted channel. Continue Reading
Evaluate Disk and file encryption tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Need to transfer files within headquarters or between branches? Managed file transfer tools now offer some interesting new features. Continue Reading
Google Cloud KMS is a new encryption key management service available for Google customers. Expert Matthew Pascucci discusses how this service works and its security benefits. Continue Reading
Many enterprises apply big data techniques to their security systems. But are these methods secure? Expert John Burke explains some of the efforts to secure big data analysis. Continue Reading
Manage Disk and file encryption tools
Learn to apply best practices and optimize your operations.
A Libgcrypt vulnerability could allow attackers to recover private RSA-1024 keys, as it allows a left-to-right sliding window that shows how specific parts of the algorithm work. Continue Reading
Expert Judith Myerson explains how IP theft can happen despite the cryptographic protections in IEEE standard P1735, as well as what can be done to protect intellectual property. Continue Reading
Don't let backup data encryption fall through the cracks. When encrypting backups, key management and compression are just two of the best practices for optimum security. Continue Reading
Problem Solve Disk and file encryption tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The ROCA vulnerability is a serious flaw in cryptographic keys. Expert Michael Cobb explains how the flaw works and what can be done to lessen the risk to enterprises. Continue Reading
The CIA Vault 7 cache exposed the Brutal Kangaroo USB malware, which can be spread to computers without an internet connection. Learn how this is possible with expert Nick Lewis. Continue Reading
The accidental publication of an Adobe private key could have put the company in jeopardy. Matt Pascucci explains how it happened and how to better protect PGP keys. Continue Reading