The Ultimate Guide to Encryption
2024 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Analyst reports
RedMonk on AI
GitHub launches GHEC data residency feature for enterpr...
Wed, 25th Sep 2024
Juniper Research on Smart Cities
Global video monitoring spend to top USD $89bn by 2024
Wed, 18th Sep 2024
FMI on Storage
Distributed cloud market to surge USD $15.5 billion by ...
Fri, 12th Jul 2024
IDC on DevOps
DigiCert reveals widening gap in digital trust manageme...
Fri, 23rd Feb 2024
IDC MarketScape on Firewalls
Sophos named Leader in midsize business security by IDC
Tue, 13th Feb 2024
Featured news
About Digital Transformation
Exclusive: Zoho's AI Director discusses right-sizing AI...
Last month
About Data Protection
Exclusive: DataKrypto's CEO champions data privacy as a...
Wed, 9th Oct 2024
About Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Tue, 1st Oct 2024
Expert columns
By Julian Fay of Senetas
Australia’s Cybersecurity Act races against augmented h...
Last week
By Alyssa Blackburn of AvePoint
Why safeguarding children’s data is essential in the di...
Last month
By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Last month
By Andrew Wilson of Senetas
Preparing for the quantum era: Safeguarding Australia a...
Last month
By Dan Pearce of Holding Redlich
New cyber security legislative package: How will it imp...
Thu, 24th Oct 2024
Interviews
Discussing Digital Transformation
Exclusive: Zoho's AI Director discusses right-sizing AI...
Last month
Discussing Data Protection
Exclusive: DataKrypto's CEO champions data privacy as a...
Wed, 9th Oct 2024
Discussing Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Tue, 1st Oct 2024
Discussing Data Protection
Exclusive: How Entrust is protecting digital identities
Wed, 15th May 2024
Discussing Developers
Exclusive: Unpacking the intricacies of digital securit...
Tue, 20th Feb 2024
More expert columns
By Martin Petrov of Integrity360
Navigating PCI DSS 4.0.1
Fri, 18th Oct 2024
By Steve Katanas of HID
Enhancing data centre security with mobile access contr...
Mon, 30th Sep 2024
By Steven Try of Snom
Solving the connectivity conundrum in UK office buildin...
Tue, 3rd Sep 2024
By Devasmita Das of ColorTokens
Beyond prevention: Why breach readiness is your cyberse...
Mon, 19th Aug 2024
By Talent International
The impact of digital transformation on the financial s...
Fri, 16th Aug 2024
By Janine Morris of AvePoint
Strengthening an organisations cybersecurity posture in...
Fri, 9th Aug 2024
Top players
Recent news
About Cloud Services
Cybersecurity predictions warn of AI, quantum threats a...
4 days ago
About Malware
CyTwist unveils engine to detect AI-powered cyberattack...
Last week
About Unified Communications
Alcatel-Lucent Enterprise enhances cybersecurity featur...
This month
About IT Training
Cybersecurity challenges in 2025: what to expect
This month
About Firewalls
Australian firms combat rising AI-driven deepfake threa...
Last month
More news
About Ransomware
Ransomware-as-a-Service group BianLian opts for unique ...
Last month
About Data Protection
Vultr & NetApp partner to boost AI cloud capabilities
Last month
About Firewalls
ASX 200 report reveals cybersecurity risks in retail se...
Last month
About Firewalls
Nile introduces campus zero trust service with partners
Last month
About Firewalls
Graphiant forecasts 2025 trends for enterprise networks
Last month
Even more news
About Data Protection
Catalogic launches DPX vPlus 7.0 with Nutanix Ready sta...
Last month
About DevOps
Bugcrowd partners with Least Authority for security boo...
Last month
About Cloud Services
Dell expands AI Factory with Microsoft to boost AI solu...
Last month
About Data Protection
CommBox secures funding for AI expansion in Europe
Last month
About Storage
Apricorn boosts storage in Aegis Secure Key 3NX line
Last month
Job moves
Move at IBM
Trellix appoints Joseph Tal to Lead Advanced Research C...
Tue, 14th Mar 2023
Move at IBM
QuSecure appoints Lisa Hammitt as First Independent Dir...
Fri, 17th Feb 2023
Move at Aras
NTT Research appoints Takashi Goto as Head of its Tech...
Fri, 23rd Sep 2022
Move at VMware
Kroll Ontrack aims to double NZ resellers by 2013
Tue, 4th Sep 2012
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, HealthTech, Artificial Intelligence, and Firewalls.
Powered by