Disk and file encryption tools
Encrypting data at rest and in motion, whether at the file level or the disk level, can be a valuable tactic in the fight against hackers. Get advice on how to secure your organization's data disk and file encryption tools and technology.
Top Stories
-
Tip
09 Jan 2023
What is Triple DES and why is it being disallowed?
Triple DES no longer provides the encryption strength it once did. Prepare now to transition away from its use to a more security alternative. Continue Reading
By -
News
28 Oct 2021
Hackers upping SSL usage for encrypted attacks, communications
A report from cloud security vendor Zscaler found that cybercriminals are using secure connections to evade detection while carrying out network attacks. Continue Reading
-
Feature
10 Apr 2015
The top full disk encryption products on the market today
Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry. Continue Reading
By- James Alan Miller, Senior Executive Editor
-
Feature
05 Dec 2014
The fundamentals of FDE: Comparing the top full disk encryption products
Expert Karen Scarfone examines the top full disk encryption products to determine which one may be best for your organization. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
25 Nov 2014
The fundamentals of FDE: Procuring full-disk encryption software
Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
20 Nov 2014
The fundamentals of FDE: The business case for full disk encryption
Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Feature
12 Nov 2014
The fundamentals of FDE: Full disk encryption in the enterprise
Expert Karen Scarfone examines full disk encryption, or FDE, tools and describes how the security technology protects data at rest on a laptop or desktop computer. Continue Reading
By- Karen Scarfone, Scarfone Cybersecurity
-
Quiz
17 Oct 2014
CISSP quiz: System architecture, security models, system evaluation
Test your knowledge of the CISSP exam's Security Architecture and Design domain by taking this practice quiz that covers topics including system architecture, security models and more. Continue Reading
By- Shon Harris , Logical Security
-
Answer
17 Oct 2014
SHA-2 algorithm: The how and why of the transition
Is it time to make the move to the SHA-2 algorithm? Application security expert Michael Cobb discusses and offers tips to ease the transition. Continue Reading
By -
Quiz
02 Oct 2014
CISSP quiz: Cryptography CISSP certification practice test
Test your knowledge of the CISSP exam's Cryptography Domain by taking this practice quiz, which covers topics including public and private keys, encryption algorithms, digital certificates and more. Continue Reading
By- Shon Harris , Logical Security
-
News
05 Feb 2014
Amid Microsoft MD5 deprecation, experts warn against SHA-1 algorithm
With Microsoft's MD5 deprecation set for next week, experts say companies must be careful to avoid other weak protocols, like SHA-1. Continue Reading
-
Answer
07 Oct 2013
The value of 2,048-bit encryption: Why encryption key length matters
Leading browsers are required to use 2,048-bit length keys by the end of the year, but what effect does this have on security? Continue Reading
By -
Tip
06 Dec 2011
P2P encryption: Pros and cons of point-to-point encryption
P2P encryption is an emerging technology; one that may be helpful for many companies, especially merchants. Mike Chapple dissects the pros and cons. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Answer
30 Aug 2011
How MAC and HMAC use hash function encryption for authentication
Hash function encryption is the key for MAC and HMAC message authentication. See how this differs from other message authentication tools from expert Michael Cobb. Continue Reading
By -
Answer
19 May 2010
MD5 security: Time to migrate to SHA-1 hash algorithm?
Many organizations have been replacing the MD5 hash algorithm with the SHA-1 hash function, but can the MD5 hash algorithm still be used securely? Continue Reading
By -
Answer
14 Jan 2010
Is it possible to crack the public key encryption algorithm?
Is it possible to create a PKI encryption key that is unbreakable? IAM expert Randall Gamby weighs in. Continue Reading
By -
Answer
23 Oct 2009
What is an encryption collision?
Michael Cobb reviews how encryption collision attacks on cryptographic hash functions could compromise the security of all kinds of digital systems. Continue Reading
By -
Answer
28 Aug 2009
What are new and commonly used public-key cryptography algorithms?
Expert Michael Cobb breaks down a variety of encryption algorithms and reviews the use cases for several types of cryptography. Continue Reading
By -
Answer
25 Aug 2009
What are the export limitations for AES data encryption?
Although AES is free for any use public or private, commercial or non-commercial programs that provide encryption capabilities are subject to U.S. export controls. Expert Michael Cobb reviews the limitations. Continue Reading
By -
Answer
27 Mar 2008
Is Triple DES a more secure encryption scheme than DUKPT?
Both DES and TDES use a symmetric key, but Michael Cobb explains their separate and distinct roles in protecting financial transactions. Continue Reading
By -
Answer
01 Oct 2007
How should sensitive customer data, such as driver's license information, be handled?
In this Q&A, Identity management and access control expert Joel Dubin discusses how to properly protect the personal data of a driver's license. Continue Reading
By