WhatIs definition: TrueCrypt
  • Getty Images/iStockphoto

    WhatIs definition: TrueCrypt

    WhatIs definition: TrueCrypt

    TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).

  • MORE HIGHLIGHTS

    OpenSSL establishes security roadmap

    Heartbleed exposed a number of long-standing issues at OpenSSL, but the open source encryption project has laid out plans to improve the organization.

  • CryptoLocker's fall won't slow ransomware's rise

    CryptoLocker's infrastructure may be down for now, but experts say the easy money that can be made from ransomware means it is here to stay.

  • TrueCrypt

    TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).

Disk Encryption and File Encryption

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Leveraging database security investments

    Enterprises are now faced with the challenge of supporting multiple database versions on differing platforms, including SQL Server, Oracle Database, IBM DB2 and MySQL. While securing a diverse database architecture is crucial, the dollars needed to m... 

  • Hashing for fun and profit: Demystifying encryption for PCI DSS

    These days there's no excuse for failing to encrypt sensitive data like credit card information, but the numerous types of cryptography, such as hashing, available can make implementation confusing. Learn how merchants are affected by the encryption ... 

  • When choosing a digital certificate, how important is the expiration period?

    In this expert Q&A, application security pro Michael Cobb helps you plan your digital certificate policy. Cobb emphasizes the importance of keeping your Web server certificates up-to-date. 

  • Utimaco strives for ultimate mobile encryption

    With new U.S. government initiatives to protect data, data encryption on mobile devices is becoming a must-have for many firms. As The 451 Group's Nick Selby writes, German vendor Utimaco Safeware is rapidly expanding its presence in the U.S. using a... 

  • public key

    In cryptography, a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures. 

  • What are the best authentication tools for locking down a laptop?

    Stolen laptops continue to be a troublesome issue for businesses. In this Identity Management and Access Control Ask the Expert Q&A, Joel Dubin reviews the best available authentication and encryption tools for securing company laptops. 

  • Laptop security essentials: Protecting device data, even from admins?

    In this ITKnowledge Exchange thread, information security pros explain how to prevent unauthorized access, but question whether measures should be put in place to protect data from admins. 

  • Laptop crypto: Do it, but realize it's not a panacea

    Laptop encryption has its pros and cons. Find out how to use laptop crypto to keep your sensitive data secure -- even if it falls in the hands of the enemy. 

  • Security Bytes: Symantec patches Veritas NetBackup PureDisk flaw

    Meanwhile: Two MySQL database flaws are fixed, a study finds that many companies have lost laptops and the VA upgrades computer encryption after recent security breaches. 

  • Security Bytes: Microsoft pulls back user-based encryption

    In other news, McAfee unwittingly fixes an ePolicy Orchestrator security flaw and multiple vulnerabilities surface in Microsoft Works.