The pros and cons of elliptic curve cryptography

Disk Encryption and File Encryption

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Encryption outside the box

    When it comes to encryption, users have two basic choices: hardware appliances or software applications. Given software's performance issues only small shops need apply. 

  • PING with Karen Worstell

    The Microsoft CISO discusses how she keeps Redmond and its products secure. 

  • Life at the edge part 3: Resistance to failure

    Learn how architecture, protocol and application-level protections work together to safeguard a Web infrastructure. 

  • Protect files and folders from snoops

    Read this tip and learn about four specific steps you can take to secure your desktop files and folders. 

  • Quiz: Cryptography

    OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message. OK, boys and girls! Do you have your secret decoder handy? Here's this week's special message." (Radio message to subscribed members of the Lone Ranger Clu... 

  • Content Scrambling System (CSS)

    Content Scrambling System (CSS) is a data encryption and authentication method used to protect digital versatile disk (DVD) movies from being illegally copied, distributed, and viewed from other devices, such as computer hard drives. 

  • one-time pad

    In cryptography, a one-time pad is a system in which a private key generated randomly is used only once to encrypt a message that is then decrypted by the receiver using a matching one-time pad and key. 

  • International Data Encryption Algorithm (IDEA)

    IDEA (International Data Encryption Algorithm) is an encryption algorithm developed at ETH in Zurich, Switzerland. 

  • What is a sufficient encryption?

     

  • The large file challenge

    E-mail attachment caching must be included in digital asset management to enable more cost effective, secure and integrated delivery of large files.