New & Notable
Disk and file encryption tools News
March 07, 2019
Cryptographers at RSAC 2019 discussed personal data protection laws and challenges, future threats and the pressure for tech companies to work with law enforcement on decryption.
December 20, 2018
Quantum computing systems may not be powerful enough to break current encryption protocols, but McAfee CTO Steve Grobman says it will be tough to tell when that day arrives.
November 12, 2018
Researchers discover major manufacturers poorly implemented SSD encryption, allowing easy access to data, and Microsoft BitLocker made the issue worse.
October 03, 2018
Quantum computing threats are on the horizon, but DigiCert, Gemalto and ISARA have teamed up to develop new quantum-proof digital certificates and remake the PKI industry.
Disk and file encryption tools Get Started
Bring yourself up to speed with our introductory content
Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to encrypt and decrypt data. Continue Reading
In computing, encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key. Continue Reading
A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt code. Continue Reading
Evaluate Disk and file encryption tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As quantum computing gains momentum with practical quantum computers due to come online as early as next year, concerns about post-quantum cryptography are pushed to the forefront. Continue Reading
Need to transfer files within headquarters or between branches? Managed file transfer tools now offer some interesting new features. Continue Reading
Google Cloud KMS is a new encryption key management service available for Google customers. Expert Matthew Pascucci discusses how this service works and its security benefits. Continue Reading
Manage Disk and file encryption tools
Learn to apply best practices and optimize your operations.
The EFF's STARTTLS Everywhere initiative encrypts email during delivery and aims to prevent mass email surveillance. Expert Michael Cobb explains how STARTTLS works. Continue Reading
As the prospect of quantum computing-based attacks grows, the need for stronger encryption increases. Expert Michael Cobb discusses lattice-based cryptography as an option. Continue Reading
NIST recently released new guidance on entropy sources used for random bit generation. Judith Myerson explains these recommendations and how they alter cryptography principles. Continue Reading
Problem Solve Disk and file encryption tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Post-quantum cryptographic algorithms are aimed at securing encrypted data against super-powerful computers in the future, but will they even be necessary? Hanno Böck explains. Continue Reading
Padding oracle attacks have long been well-known and well-understood. Find out how they work and why using modern encryption protocols can reduce the risks. Continue Reading
Outside of user perceptions, how safe is secure email in terms of protecting users' data in transit? Our expert explains how much the SSL and TLS protocols can protect email. Continue Reading