The pros and cons of elliptic curve cryptography

Disk Encryption and File Encryption

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Best of encryption products 2013

    Readers vote on the top encryption products in 2013: full drive encryption, mobile storage, certificate management and secure communications. 

  • Choosing security products: DLP technology

    Data loss prevention technology remains critical in preventing data leakage. In this guide, learn what to consider when evaluating DLP products. 

  • Quiz: Demystifying data encryption

    A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of's Data Protection Security School. 

  • Data encryption demystified

    Five years ago, security professionals needed a deep understanding of cryptography to make encryption work. Today, thanks to advancements in "practical" cryptography, data encryption is more user-friendly, and easier to implement and manage across mu... 

  • Locking down database applications

    In this lesson, learn how to secure database apps by building roles and privileges and monitoring access to prevent insider abuse, plus satisfy regulators by properly segregating duties and limiting application access to sensitive database data. 

  • Quiz: Storage security

    Regulations like SOX and the recently approved Personal Data Privacy and Security Act are bringing the importance of data protection to light. Loss of data – be it inadvertent or surreptitious -- can result in fines, loss of revenue and loss of... 

  • PING with Karen Worstell

    The Microsoft CISO discusses how she keeps Redmond and its products secure. 

  • Life at the edge part 3: Resistance to failure

    Learn how architecture, protocol and application-level protections work together to safeguard a Web infrastructure. 

  • How to address SAN architecture security weaknesses

    SAN technology has burst out of the data center, exposing the world to SAN architecture security weaknesses.