WhatIs definition: TrueCrypt
  • Getty Images/iStockphoto

    WhatIs definition: TrueCrypt

    WhatIs definition: TrueCrypt

    TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).


    OpenSSL establishes security roadmap

    Heartbleed exposed a number of long-standing issues at OpenSSL, but the open source encryption project has laid out plans to improve the organization.

  • CryptoLocker's fall won't slow ransomware's rise

    CryptoLocker's infrastructure may be down for now, but experts say the easy money that can be made from ransomware means it is here to stay.

  • TrueCrypt

    TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).

Disk Encryption and File Encryption

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Best of encryption products 2013

    Readers vote on the top encryption products in 2013: full drive encryption, mobile storage, certificate management and secure communications. 

  • Choosing security products: DLP technology

    Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. 

  • Feds: Electronic health records privacy will require metadata scheme

    For the first time, the government is propounding a conceptual framework for securing electronic health records. 

  • Quiz: Demystifying data encryption

    A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School. 

  • Data encryption demystified

    Five years ago, security professionals needed a deep understanding of cryptography to make encryption work. Today, thanks to advancements in "practical" cryptography, data encryption is more user-friendly, and easier to implement and manage across mu... 

  • Locking down database applications

    In this lesson, learn how to secure database apps by building roles and privileges and monitoring access to prevent insider abuse, plus satisfy regulators by properly segregating duties and limiting application access to sensitive database data. 

  • Quiz: Storage security

    Regulations like SOX and the recently approved Personal Data Privacy and Security Act are bringing the importance of data protection to light. Loss of data – be it inadvertent or surreptitious -- can result in fines, loss of revenue and loss of... 

  • PING with Karen Worstell

    The Microsoft CISO discusses how she keeps Redmond and its products secure. 

  • Life at the edge part 3: Resistance to failure

    Learn how architecture, protocol and application-level protections work together to safeguard a Web infrastructure. 

  • How to address SAN architecture security weaknesses

    SAN technology has burst out of the data center, exposing the world to SAN architecture security weaknesses.