The Ultimate Guide to Encryption
2025 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Analyst reports

Gartner on Risk & Compliance
GenAI poses potential risk for 40% of AI data breaches ...
Last month

Gartner on DevOps
Sectigo launches post-quantum cryptography testing labs
Last month

Gartner on Quantum Computing
Sectigo unveils platform for post-quantum cryptography ...
Last month

Juniper Research on Firewalls
Telecom industry to invest USD $6 billion in QKD by 203...
Thu, 30th Jan 2025

Gartner on Fintech
Alibaba Cloud leads 2024 Magic Quadrant for 5th year
Thu, 23rd Jan 2025
Expert columns

By Simon Pamplin of Certes
Beyond ransomware payments: A proactive approach to cyb...
Last month

By BPC Commercial
The clock is ticking: Why businesses must prepare for W...
Last month

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025

By Julian Fay of Senetas
Australia’s Cybersecurity Act races against augmented h...
Mon, 16th Dec 2024

By Alyssa Blackburn of AvePoint
Why safeguarding children’s data is essential in the di...
Thu, 28th Nov 2024
Interviews

Discussing Digital Transformation
Exclusive: Zoho's AI Director discusses right-sizing AI...
Fri, 15th Nov 2024

Discussing Data Protection
Exclusive: DataKrypto's CEO champions data privacy as a...
Wed, 9th Oct 2024

Discussing Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Tue, 1st Oct 2024

Discussing Data Protection
Exclusive: How Entrust is protecting digital identities
Wed, 15th May 2024
More expert columns

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Andrew Wilson of Senetas
Preparing for the quantum era: Safeguarding Australia a...
Mon, 11th Nov 2024

By Dan Pearce of Holding Redlich
New cyber security legislative package: How will it imp...
Thu, 24th Oct 2024

By Martin Petrov of Integrity360
Navigating PCI DSS 4.0.1
Fri, 18th Oct 2024

By Steve Katanas of HID
Enhancing data centre security with mobile access contr...
Mon, 30th Sep 2024

By Steven Try of Snom
Solving the connectivity conundrum in UK office buildin...
Tue, 3rd Sep 2024
Top players
Recent news

About Surveillance
Arkeus secures AUD $5m funding to boost global expansio...
Last week

About Malware
Spike in remote ransomware attacks reported by Sophos
Last week

About Firewalls
Cloudflare expands post-quantum security in Zero Trust ...
Last week

About Malware
Google's in-car gaming sparks cybersecurity concerns
Last week

About Cloud Services
Kiteworks achieves FedRAMP High Ready status for Gov Cl...
This month
More news

About Data Protection
DigiCert digital trust solutions now on AWS Marketplace
This month

About Quantum Computing
SandboxAQ joins UN AI Hub to enhance AI security soluti...
This month

About Data encryption
AWS unveils Ocelot chip claiming 90% cost reduction
Last month

About Firewalls
WitnessAI integrates with F5 for AI traffic visibility
Last month

About Data Protection
Emburse debuts AI for efficient expense management
Last month
Even more news

About Software Updates
Microsoft's February 2025 patch fixes 56 vulnerabilitie...
Last month

About Quantum Computing
SECQAI unveils world's first hybrid Quantum LLM technol...
Last month

About Cloud Services
Mandiant partners with Android team to tackle concealed...
Last month

About Digitisation
Sectigo acquires Entrust's certificate business to expa...
Last month

About Fintech
Finkeda enhances fintech security with blockchain tech
Fri, 31st Jan 2025
Job moves

Move at IBM
Trellix appoints Joseph Tal to Lead Advanced Research C...
Tue, 14th Mar 2023

Move at IBM
QuSecure appoints Lisa Hammitt as First Independent Dir...
Fri, 17th Feb 2023

Move at Aras
NTT Research appoints Takashi Goto as Head of its Tech...
Fri, 23rd Sep 2022

Move at VMware
Kroll Ontrack aims to double NZ resellers by 2013
Tue, 4th Sep 2012
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Artificial Intelligence, HealthTech, and Firewalls.
Powered by