The Ultimate Guide to Encryption
2025 edition
Overview
Used by the ancient Egyptians, hiding the true nature of transmitted communications has a history going back thousands of years. In more modern times, a famous example is the Enigma machines used by the Germans in the Second World War. Today, encryption is a standard practice for protecting transmissions over the internet or any other networks, essentially using the same practices of converting messages into a secret code which can only be decrypted (and understood) by those with the corresponding key. Encrypted data is called ciphertext, while unencrypted data is called plaintext.
Analyst reports

Gartner on UC
Proofpoint acquires Nuclei to boost AI workplace compli...
Last week

Gartner on IoT Security
Australian firms lag in preparation for quantum computi...
This month

Gartner on Storage
Nutanix & Pure Storage team up for flexible virtual wor...
This month

Gartner on Risk & Compliance
GenAI poses potential risk for 40% of AI data breaches ...
Tue, 18th Feb 2025

Gartner on DevOps
Sectigo launches post-quantum cryptography testing labs
Fri, 14th Feb 2025
Expert columns

By Dvir Hoffman of CommBox
Unlocking Retail Growth: The WhatsApp Customer Service ...
This month

By Rakesh Prabhakar of Zoho
How can small and medium businesses safeguard against r...
Last month

By Karl Harris of Gallagher Security
A step ahead: How Gallagher’s Security Readiness Guide ...
Last month

By Simon Pamplin of Certes
Beyond ransomware payments: A proactive approach to cyb...
Mon, 17th Feb 2025

By BPC Commercial
The clock is ticking: Why businesses must prepare for W...
Mon, 3rd Feb 2025
Interviews

Discussing EduTech
Google Cloud Canada grows with focus on AI and sovereig...
Last month

Discussing Digital Transformation
Exclusive: Zoho's AI Director discusses right-sizing AI...
Fri, 15th Nov 2024

Discussing Data Protection
Exclusive: DataKrypto's CEO champions data privacy as a...
Wed, 9th Oct 2024

Discussing Storage
Exclusive: Wasabi's Rob Waite discusses growth, cloud s...
Tue, 1st Oct 2024
More expert columns

By Stephen Kho of Avast
Ransomware is doubling down — What you need to know abo...
Tue, 7th Jan 2025

By Julian Fay of Senetas
Australia’s Cybersecurity Act races against augmented h...
Mon, 16th Dec 2024

By Alyssa Blackburn of AvePoint
Why safeguarding children’s data is essential in the di...
Thu, 28th Nov 2024

By Simon Howe of ExtraHop
Guarding against ransomware in the midgame
Thu, 14th Nov 2024

By Andrew Wilson of Senetas
Preparing for the quantum era: Safeguarding Australia a...
Mon, 11th Nov 2024

By Dan Pearce of Holding Redlich
New cyber security legislative package: How will it imp...
Thu, 24th Oct 2024
Top players
Recent news

About Malware
Organisations boost AI security as data threats & risks...
Last week

About Machine learning
SurveyMonkey launches Trust Centre as UK firms face AI ...
Last week

About Cloud Services
Report finds low ECH use but risks from malicious actor...
Last week

About Malware
Organisations prioritise AI security as GenAI adoption ...
Last week

About Storage
Synology launches BeeStation Plus with 8 TB storage & A...
Last week
More news

About Data encryption
MirrorWeb launches Sentinel to cut false compliance ale...
Last week

About Data encryption
Boomi acquires Thru to enhance secure file transfer pla...
This month

About Cloud Services
Entrust unveils unified cryptographic platform for mode...
This month

About Storage
Nutanix & Pure Storage partner for scalable virtual wor...
This month

About Data Protection
Over 1,200 government devices lost or stolen across 202...
This month
Even more news

About Bring Your Own Device
Half of Firms May Ban Personal Devices Over AV Risks
This month

About Passwords
Kaspersky warns AI-generated passwords expose users to ...
This month

About Cloud Services
Businesses intensify efforts to secure data in cloud co...
This month

About Cyber Threats
PentenAmio merger targets secure global cyber defence g...
Last month

About Online security
World Password Day highlights risks & best practices fo...
Last month
Job moves

Move at IBM
Trellix appoints Joseph Tal to Lead Advanced Research C...
Tue, 14th Mar 2023

Move at IBM
QuSecure appoints Lisa Hammitt as First Independent Dir...
Fri, 17th Feb 2023

Move at Aras
NTT Research appoints Takashi Goto as Head of its Tech...
Fri, 23rd Sep 2022

Move at VMware
Kroll Ontrack aims to double NZ resellers by 2013
Tue, 4th Sep 2012
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Artificial Intelligence, HealthTech, and Firewalls.
Powered by