WhatIs definition: TrueCrypt
  • Getty Images/iStockphoto

    WhatIs definition: TrueCrypt

    WhatIs definition: TrueCrypt

    TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).

  • MORE HIGHLIGHTS

    OpenSSL establishes security roadmap

    Heartbleed exposed a number of long-standing issues at OpenSSL, but the open source encryption project has laid out plans to improve the organization.

  • CryptoLocker's fall won't slow ransomware's rise

    CryptoLocker's infrastructure may be down for now, but experts say the easy money that can be made from ransomware means it is here to stay.

  • TrueCrypt

    TrueCrypt is a cross-platform open source program for file and full disk encryption (FDE).

Disk Encryption and File Encryption

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • The future of PCI DSS encryption requirements? Tokenization for PCI

    Can tokenization help reduce the scope of PCI DSS? How does tokenization interact with PCI DSS encryption requirements? Learn more about this technology and whether it's right for your enterprise. 

  • How to choose full disk encryption for laptop security, compliance

    Full disk encryption is becoming a priority for laptop security in midmarket companies because of regulatory compliance and fear of data breaches. Consider central management, ease of deployment, user transparency, reporting, platform support and pri... 

  • Workstation hard drive encryption: Overdue or overkill?

    In an age of high-profile data breaches and insider risks, encryption is an important defense mechanism for enterprises. The question is: how much encryption is necessary? Many security pros have gone to great lengths to protect data on network serv... 

  • Windows BitLocker: Enabling disk encryption for data protection

    With Windows Vista, Microsoft introduced a whole-disk encryption mechanism called BitLocker. The feature has enabled Windows to provide better data protection, but the tool is not without drawbacks. Contributor Tony Bradley stacks BitLocker up agains... 

  • Storage vulnerabilities you can't afford to miss

    In this tip, Keavin Beaver identifies eight common storage security vulnerabilites that are often overlooked and examines why network admins should develop a layered security strategy to protect sensitive data. 

  • Encryption strategies for preventing laptop data leaks

    The majority of enterprise notebook computers contain sensitive information. Should those devices fall into the wrong hands, encryption can keep the data safe. Expert Lisa Phifer discusses the pros and cons of today's notebook data encryption methods... 

  • PCI Data Security Standard compliance: Setting the record straight

    Helping executives understand what PCI Data Security Standard compliance is all about can be a challenge, especially when it comes to debunking the many myths that have been perpetuated over the years. Read this tip by contributor John Kindervag as h... 

  • Considerations for encryption and compliance

    It's often thought that a wide-ranging encryption implementation can prevent data loss and satisfy compliance mandates. Reality, of course, is more complex. Contributor Trent Henry discusses the pros and cons of various encryption strategies, as well... 

  • Unlocking best practices for successful encryption key management

    The importance of encryption has long been obvious to security professionals, but the complexity of encryption key management can be almost as daunting as the cryptography algorithms themselves. In this tip, W. Curtis Preston examines today's primary... 

  • Leveraging database security investments

    Enterprises are now faced with the challenge of supporting multiple database versions on differing platforms, including SQL Server, Oracle Database, IBM DB2 and MySQL. While securing a diverse database architecture is crucial, the dollars needed to m...