• Amazon Elastic Block Storage encryption explained

    Amazon EBS encryption is now offered by AWS. Expert Dave Shackleford explains how it works, why companies might struggle with it and whether it brings the industry one step closer to default cloud data encryption.

    SearchCloudSecurity2,610 pointsBadges:
  • What do you think is the safest form of encryption?

    ITKE345,295 pointsBadges:
  • Understanding encryption and cryptography basics

    Cryptography doesn't have to be so cryptic. Here's a primer, in plain English, to walk you through the basics.

    ITKE345,295 pointsBadges:
  • HIPAA encryption requirements: Is proof of PHI encryption needed?

    HIPAA encryption requirements don't specifically include devices containing PHI, but expert Mike Chapple says it's still a good practice.

    searchsecurity20,935 pointsBadges:
  • How to protect a laptop: Biometrics vs. encryption

    How has biometrics changed the laptop security landscape? Is full disk encryption even necessary on a laptop with a biometric scanner? Learn more in this expert response.

    searchsecurity20,935 pointsBadges:
  • Do PCI SSC-approved point-to-point encryption products reduce scope?

    Expert Mike Chapple details the potential benefits for organizations that choose PCI SSC-approved point-to-point encryption products.

    searchsecurity20,935 pointsBadges:
  • Expert advice: Encryption 101 — Triple DES explained

    Here is Jon Callas full expert response to a recent user question on Triple DES in Ask the Expert.

    ITKE345,295 pointsBadges:
  • Ransomware: How to deal with advanced encryption algorithms

    It's late in the day, and your CEO reports a strange message on his computer screen: his files have been encrypted, and a payment is required to return all of his data. What do you do? Don't give in to the cyberterrorists just yet. Mike Chapple explains five ways that you can fight ransomware and...

    searchsecurity20,935 pointsBadges:
  • How to manage encryption keys, page 2

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

    ITKE345,295 pointsBadges:
  • The merits of encryption vs. hashing after the Adobe password breach

    In light of the Adobe password breach, expert Michele Chubirka explains the difference between encryption and hashing when storing passwords.

    searchsecurity20,935 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.