The Ultimate Guide to Encryption
2023 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Recent news

About Cyber Criminal
Ransomware gangs increasingly 'professional' - WithSecu...
Last month

About IT solutions
Healthcare cybersecurity gets innovative encrypted chat...
Last month

About Data Protection
Apricorn releases its first offering to feature NVME SS...
Last month

About Data breach
UK councils admit security failings with 1500 data brea...
Thu, 20th Apr 2023

About Cybersecurity
Entrust launches zero trust-ready solutions for enterpr...
Tue, 18th Apr 2023
More news

About Channel partners
Highside partners Nine23 for soverign secure communicat...
Wed, 18th Jan 2023

About Synology
Synology creates a data warehouse for Taiwan AI Labs
Fri, 25th Nov 2022

About WatchGuard Technologies
Decrease in malware volume, but surge in encrypted malw...
Thu, 29th Sep 2022

About Varonis
Varonis adds secrets discovery to data classification
Thu, 29th Sep 2022

About Credit card fraud
Entrust advances Sigma Instant Issuance Platform for ca...
Thu, 15th Sep 2022
Even more news

About Breach Prevention
Global retailer overhauls cybersecurity posture with Ch...
Thu, 8th Sep 2022

About Breach Prevention
Education institutions hit hard by ransomware - study
Thu, 21st Jul 2022

About Bots
Radware announces enhanced Bot Manager with crypto miti...
Thu, 21st Jul 2022

About Optima
Bill Identity Limited rebrands to Optima Technology
Wed, 13th Jul 2022

About Data encryption
QuSecure partners with DataBridge Sites to showcase pla...
Thu, 16th Jun 2022
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Data Protection, Malware, and Network Management.
Powered by