The Ultimate Guide to Encryption
2024 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Expert columns
![Story image](../../../../../uploads/story/2024/07/11/preview_techday_6782f8eaa02050200293.webp)
By Karthik Sj of LogicMonitor
AI's new frontier: bringing intelligence to the data so...
This month
![Story image](../../../../../uploads/story/2024/07/01/preview_techday_81a4f349eac50ab67d8c.webp)
By Annexa
Myths and misconceptions about cloud ERP debunked
This month
![Story image](../../../../../uploads/story/2024/06/18/preview_Why_data_is_still_leaking_cover_image_SquareX.webp)
By Dakshitaa Babu of SquareX
Why data still leaks through enterprise DLP solutions
Last month
![Story image](../../../../../uploads/story/2024/06/03/preview_img-vOiVlQs2wmxpOdir3gSwGURs.webp)
By Gigamon
Network visibility: How to improve it and why it will i...
Last month
![Story image](../../../../../uploads/story/2024/06/03/preview_Andrew_Wilson_CEO__Senetas.webp)
By Andrew Wilson of Senetas
Australia’s National Cybersecurity Act races against te...
Last month
More expert columns
![Story image](../../../../../uploads/story/2024/05/03/preview_Matthew_Lowe.webp)
By Matthew Lowe of LogRhythm
Under the knife: Healthcare sector grappling with risin...
Fri, 3rd May 2024
![Story image](../../../../../uploads/story/2024/05/02/preview_img-HxlMgvs503iLLYQpm6B2e2yW.webp)
By Jonathan Tanner of Barracuda Networks
The remote desktop tools most targeted by attackers in ...
Thu, 2nd May 2024
![Story image](../../../../../uploads/story/2024/04/04/preview_Conan_Bradley_Kordia.webp)
By Conan Bradley of Kordia
Rebuilding after ransomware – The case of The British L...
Thu, 4th Apr 2024
![Story image](../../../../../uploads/story/2024/04/03/preview_img-WZCCF9tWQQDMXZ4uFkJ4qPv1.webp)
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
Wed, 3rd Apr 2024
![Story image](../../../../../uploads/story/2024/04/03/preview_Sentinel_One_049.webp)
By Jason Duerden of SentinelOne
Overcoming the data challenges associated with gen AI d...
Wed, 3rd Apr 2024
![Story image](../../../../../uploads/story/2024/03/12/preview_img-4o0XftJmdoav8hEj217b4uU7.webp)
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Mon, 25th Mar 2024
Top players
Recent news
![Story image](../../../../../uploads/story/2024/07/25/preview_techday_003fef42f81c7f1e4f50.webp)
About Cloud Services
Ecommpay partners with Mastercard to launch Click to Pa...
3 days ago
![Story image](../../../../../uploads/story/2024/07/25/preview_techday_dce17dd11a1d1b822157.webp)
About Antivirus
Enhanced cybersecurity measures urged by Software@Scale
3 days ago
![Story image](../../../../../uploads/story/2024/07/25/preview_techday_de7db320c3e432d8925d.webp)
About Cloud Services
Google Cloud releases air-gapped appliance for harsh en...
3 days ago
![Story image](../../../../../uploads/story/2024/07/22/preview_techday_77ed123fcc9ce1c5da66.webp)
About Utilities
Ransomware recovery costs soar in energy & water sector...
4 days ago
![Story image](../../../../../uploads/story/2024/07/17/preview_techday_c9aa6272b6cdabcf6a93.webp)
About Cloud Services
Eclypses launches Secure MTE data protection on AWS Mar...
Last week
More news
![Story image](../../../../../uploads/story/2024/07/11/preview_techday_1ddd7aefb081dbc3621c.webp)
About Cloud Services
HID & Inner Range extend partnership for wallet-enabled...
This month
![Story image](../../../../../uploads/story/2024/07/08/preview_techday_c9961f0c0df901472612.webp)
About Productivity
Tolley launches Tolley+ AI to transform UK tax practice
This month
![Story image](../../../../../uploads/story/2024/07/10/preview_techday_79889cc64a61928b01e3.webp)
About Software-as-a-Service
Ennoventure enhances leadership team to drive strategic...
This month
![Story image](../../../../../uploads/story/2024/07/10/preview_techday_4a16d4f58262e86df315.webp)
About Aggregated data
Figma launches AI-driven tools with strong privacy focu...
This month
![Story image](../../../../../uploads/story/2024/07/03/preview_techday_10d968d45bd6a6995931.webp)
About Public Sector
Google Cloud & Gulf Edge join forces for Thai cloud ser...
This month
Even more news
![Story image](../../../../../uploads/story/2024/06/27/preview_techday_70ca699d4671ebad1f88.webp)
About Government
Apricorn earns ISO 9001:2015 certification for quality ...
Last month
![Story image](../../../../../uploads/story/2024/06/26/preview_techday_29f9afcca18d428670a4.webp)
About Ransomware
Adlumin enhances ransomware prevention with new exfiltr...
Last month
![Story image](../../../../../uploads/story/2024/06/20/preview_techday_d73539ade29283c532e0.webp)
About Cloud Services
Scality named leader in 2024 GigaOm Radar for object st...
Last month
![Story image](../../../../../uploads/story/2024/06/19/preview_techday_edcdb5a6695c3f9c40b5.webp)
About Passwords
Study reveals 45% of passwords crackable within a minut...
Last month
![Story image](../../../../../uploads/story/2024/06/19/preview_techday_c334184142157cc6082e.webp)
About Software Updates
Businesses underprepared as data breaches soar 25% in 2...
Last month
Job moves
![Story image](../../../../../fallback.webp)
Move at IBM
Trellix appoints Joseph Tal to Lead Advanced Research C...
Tue, 14th Mar 2023
![Story image](../../../../../uploads/story/2023/02/17/preview_LisaHammittpicture.webp)
Move at IBM
QuSecure appoints Lisa Hammitt as First Independent Dir...
Fri, 17th Feb 2023
![Story image](../../../../../fallback.webp)
Move at Aras
NTT Research appoints Takashi Goto as Head of its Tech...
Fri, 23rd Sep 2022
![Story image](../../../../../uploads/story/2014/12/05/preview_122008768_5.webp)
Move at VMware
Kroll Ontrack aims to double NZ resellers by 2013
Tue, 4th Sep 2012
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Malware, Data Protection, and Firewalls.
Powered by