Deep Dive

Download the Encryption Deep Dive Report

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

Cryptography means more than just data encryption, but harnessing its full potential requires careful planning. Here's how to build and deploy an effective enterprise encryption strategy

encryption deep dive

Encryption has never been more important. As an ever-growing number of systems fall prey to malicious attack, encryption provides a last line of defense against data theft and other nefarious activities. In this Deep Dive, renowned security expert and InfoWorld contributing editor Roger Grimes provides a comprehensive guide to the uses, inner workings, weaknesses, and management issues related to encryption.

This PDF provides the following benefits:

  • A walkthrough of the many uses of encryption and a glossary of essential terms
  • A complete discussion of how encryption works, including cipher keys, cryptographic hashes, asymmetric encryption, and more
  • The ins and outs of public key infrastructure, from key management to revocation management

To continue reading this article register now