New & Notable
Disk and file encryption tools News
March 07, 2019
Cryptographers at RSAC 2019 discussed personal data protection laws and challenges, future threats and the pressure for tech companies to work with law enforcement on decryption.
December 20, 2018
Quantum computing systems may not be powerful enough to break current encryption protocols, but McAfee CTO Steve Grobman says it will be tough to tell when that day arrives.
November 12, 2018
Researchers discover major manufacturers poorly implemented SSD encryption, allowing easy access to data, and Microsoft BitLocker made the issue worse.
October 03, 2018
Quantum computing threats are on the horizon, but DigiCert, Gemalto and ISARA have teamed up to develop new quantum-proof digital certificates and remake the PKI industry.
Disk and file encryption tools Get Started
Bring yourself up to speed with our introductory content
Scrambling plaintext into ciphertext is essential to ensure data cannot be read or used by the wrong people. Learn the basics of symmetric key encryption algorithms here. Continue Reading
New topics, from security engineering to quantum computing, are covered in 'Computer Security Fundamentals,' but the book's author suggests readers review some basic topics, too. Continue Reading
See which encryption method uses digital signatures, symmetric key exchanges, bulk encryption and much more in this Diffie-Hellman vs. RSA showdown. Continue Reading
Evaluate Disk and file encryption tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Explore the differences between symmetric vs. asymmetric encryption algorithms, including common uses and examples of both, as well as their pros and cons. Continue Reading
Android encryption has evolved over the years, and full-disk encryption isn't an option in Android 10. IT must learn the best native encryption options for managed Android devices. Continue Reading
As quantum computing gains momentum with practical quantum computers due to come online as early as next year, concerns about post-quantum cryptography are pushed to the forefront. Continue Reading
Manage Disk and file encryption tools
Learn to apply best practices and optimize your operations.
Beyond protecting enterprise databases from vulnerabilities, it is critical to improve and review their security on a regular basis. Learn more with these database security best practices. Continue Reading
Built into business versions of the Windows OS, Microsoft BitLocker encryption is an integral enterprise encryption tool. Read on to learn how BitLocker works and how to manage it. Continue Reading
Whether data is stored in a VM or in the cloud, centralized encryption key management is critical to prevent theft and protect data from unwanted eyes. Continue Reading
Problem Solve Disk and file encryption tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center and in the Azure cloud platform. Continue Reading
Choosing to encrypt confidential data with AES or DES encryption is an important cybersecurity matter. Learn about the important differences between AES and DES. Continue Reading
Post-quantum cryptographic algorithms are aimed at securing encrypted data against super-powerful computers in the future, but will they even be necessary? Hanno Böck explains. Continue Reading