Features
Features
Disk and file encryption tools
-
Data security guide: Everything you need to know
This data security guide digs into data protection and privacy compliance, explaining how to construct a proactive security strategy strengthened by best practices. Continue Reading
-
How to secure data at rest, in use and in motion
With internal and external cyberthreats on the rise, check out these tips to best protect and secure data at rest and in motion. Continue Reading
-
Cryptography basics: Symmetric key encryption algorithms
Scrambling plaintext into ciphertext is essential to ensure data cannot be read or used by the wrong people. Learn the basics of symmetric key encryption algorithms here. Continue Reading
-
'Computer Security Fundamentals:' Quantum security to certifications
New topics, from security engineering to quantum computing, are covered in 'Computer Security Fundamentals,' but the book's author suggests readers review some basic topics, too. Continue Reading
-
Quantum computers mean cryptography needs to change, and soon
As quantum computing gains momentum with practical quantum computers due to come online as early as next year, concerns about post-quantum cryptography are pushed to the forefront. Continue Reading
-
Safety of Web Applications
In this excerpt from chapter three of Safety of Web Applications, author Eric Quinton discusses symmetric and asymmetric encryption. Continue Reading
-
Computer and Information Security Handbook
In this excerpt from chapter three of Computer and Information Security Handbook, author John R. Vacca reviews the basics of cryptography. Continue Reading
-
WinMagic SecureDoc: Full-disk encryption product overview
Expert Karen Scarfone examines the features of WinMagic's SecureDoc, a full-disk encryption product for laptops, desktops, mobile devices and servers. Continue Reading
-
Dissecting the Hack
In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian Baskin discuss Bitcoin and digital currency. Continue Reading
-
Readers' 2016 top picks for enterprise encryption tools
As the enterprise encryption tools market matures, buyers find many vendors to choose from, but few stand out from the crowd as encryption is absorbed into other security tools. Continue Reading
-
Enterprise encryption: Do the plusses outweigh the 'minuses'?
Encryption is a powerful tool, but its implementation presents its own set of perils. CISOs weigh in on data privacy and key management strategies. Continue Reading
-
Choosing secure file transfer products for your enterprise
Are you concerned about file transfer security? Expert Karen Scarfone discusses the best products for transporting files while maintaining their confidentiality. Continue Reading
-
Voltage SecureMail encryption tool: Product overview
Expert contributor Karen Scarfone takes a look at Voltage SecureMail for encrypting email messages in the enterprise. Continue Reading
-
Trend Micro Email Encryption: Product overview
Expert contributor Karen Scarfone examines Trend Micro's suite of email encryption software products for securing email messages in the enterprise. Continue Reading
-
DataMotion SecureMail software: Product overview
Expert contributor Karen Scarfone examines DataMotion SecureMail software for encrypting email messages in the enterprise. Continue Reading
-
Symantec Desktop Email Encryption: Product overview
Expert contributor Karen Scarfone examines Symantec Desktop Email Encryption, a tool for encrypting email messages for individuals within the enterprise. Continue Reading
-
Proofpoint Email Encryption: Product overview
Expert contributor Karen Scarfone examines Proofpoint Email Encryption products, which come with data loss prevention capability and a Secure Share add-on for secure file sharing. Continue Reading
-
The top threat intelligence services for enterprises
Threat intelligence takes data from multiple sources and turns it into actionable, contextual information. Expert Ed Tittel takes a look at the top threat intelligence services. Continue Reading
-
Symantec Endpoint Encryption: Full disk encryption product overview
Expert Karen Scarfone examines the features of Symantec Endpoint Encryption, a full disk encryption product for Windows laptops, desktops and servers. Continue Reading
-
Sophos SafeGuard: Full disk encryption product overview
Expert Karen Scarfone examines the features of Sophos SafeGuard, a full disk encryption product for laptops, desktops and servers. Continue Reading
-
Microsoft BitLocker: Full disk encryption software overview
Expert Karen Scarfone examines the features of BitLocker, Microsoft's native full disk encryption software for Windows laptops, desktops and servers. Continue Reading
-
McAfee Complete Data Protection: Full disk encryption product overview
Expert Karen Scarfone examines the features of McAfee Complete Data Protection, a full disk encryption product for securing client-side computers and servers. Continue Reading
-
DiskCryptor: Full disk encryption product overview
Expert Karen Scarfone examines the features of DiskCryptor, an open source full disk encryption product for securing client-side computers and servers. Continue Reading
-
Dell Data Protection | Encryption: Full disk encryption product overview
Expert Karen Scarfone examines the features of Dell Data Protection | Encryption, a full disk encryption product for securing client-side devices. Continue Reading
-
Check Point Full Disk Encryption product overview
Expert Karen Scarfone examines the features of Check Point Full Disk Encryption, an FDE product for securing client devices such as laptops and desktops. Continue Reading
-
Apple FileVault 2: Full disk encryption software overview
Expert Karen Scarfone examines the features of Apple's bundled full disk encryption software for Mac OS X, FileVault 2. Continue Reading
-
The top full disk encryption products on the market today
Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry. Continue Reading
-
Comparing the best email encryption software products
Expert Karen Scarfone examines the best email encryption products in the market and offers guidelines to help enterprises determine which ones may be best for their organizations. Continue Reading
-
How to procure email encryption software
Expert contributor Karen Scarfone examines the most important criteria for evaluating email encryption software for deployment within the enterprise. Continue Reading
-
The fundamentals of FDE: Comparing the top full disk encryption products
Expert Karen Scarfone examines the top full disk encryption products to determine which one may be best for your organization. Continue Reading
-
The fundamentals of FDE: Procuring full-disk encryption software
Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise. Continue Reading
-
The fundamentals of FDE: The business case for full disk encryption
Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization. Continue Reading
-
The fundamentals of FDE: Full disk encryption in the enterprise
Expert Karen Scarfone examines full disk encryption, or FDE, tools and describes how the security technology protects data at rest on a laptop or desktop computer. Continue Reading
-
CISSP training video: Security Architecture and Design
In this CISSP Essentials Security School video presentation, Shon Harris details the first half of the Security Architecture and Design domain, including system components, system protection, CUP and memory management and more. Continue Reading
-
CISSP training video: Access control security models
In this CISSP Essentials Security School presentation, Shon Harris discusses the topics of security models, assurance evaluation and certification/accreditation in the Security Architecture and Design domain. Continue Reading
-
CISSP online training: Security Architecture and Design
Spotlight article: Shon Harris discusses the main topics in the CISSP domain on security architecture and design, highlighting formal architectures, system architectures, security models and system evaluation. Continue Reading
-
CISSP cryptography training: PKI, digital certificates
In this CISSP Essentials Security School video presentation, Shon Harris discusses two core tenants of the cryptography domain: public key infrastructure and the use of digital certificates. Continue Reading
-
How to address SAN architecture security weaknesses
SAN technology has burst out of the data center, exposing the world to SAN architecture security weaknesses. Continue Reading
-
IPSec best practices to secure IP-based storage systems
Learn the security challenges associated with IP-based storage systems and uncover IPSec best practices to help ensure system safety without sacrificing performance. Continue Reading