Data infrastructure optimization, availability & security software
Data integration & quality software
The Next Wave of technology & innovation

The Top 10 Posts on Encryption For the First Half of 2019

With increases in data breaches, the topics of data encryption and its importance are appearing more often in public discussions of data security. Because of this, we decided to wrap up the top ten posts on Encryption from the first half of 2019. Check them out!

#10 PGP vs. RSA: How Are They Different?

Some of the acronyms you see are different encryption types, while others are protocols that can be used within different encryption types. We’ll look here at two acronyms that sometimes cause confusion—PGP and RSA. Read More >

#9 Data Breaches Due to Unencrypted Information Represent a Huge Business Risk

Data breaches of unencrypted sensitive information occur often, and many are highly publicized. Businesses are thrust into the spotlight and scrutinized for scandalous lack of oversight and accountability around data security. And even though these breaches happen at the IT level, the burden and the blame for a data breach usually falls on C-level leaders such as the CEO or CIO. Read More >

#8 Dangers of Encryption on the IBM i (AS/400, i series): 7 Pitfalls to Avoid

Implementing encryption in IBM i Db2 is an essential part of an in-depth defense strategy. But there are lots of pitfalls to avoid. Let’s take a look at seven common dangers (including how Syncsort’s Assure Encryption can help in each area). Read More >

#7 PCI Compliance Standards (PCI DSS): What You Should Know and Why They Matter

The Payment Card Industry Data Security Standards (PCI DSS) requires organizations to encrypt credit card account numbers stored in their databases and ensure that data remains secure when transferred outside the company. In order to understand these PCI compliance requirements, we first should know the source of industry best practices for encryption key management. Read More >

#6 Data Scrambling vs. Encryption

For most organizations, the motivation to encrypt their data is closely tied to various compliance requirements. Such compliance regulations include PCI DSS, HIPAA, HITECH, GDPR, Sarbanes-Oxley (SOX) and a whole host of regional privacy laws. So, if you’re going through the due diligence of database encryption, you want to make sure you get it right – the first time! Read More >

Encryption, Tokenization, and Anonymization for IBM i - A Quick Guide to Protecting Sensitive Data - banner

#5 FTPS, SFTP and PGP Encryption: Core Components of a Secure File Transfer Strategy

One simple way to ensure the security of your data is to use a secure managed file transfer solution to protect and secure transfers as they move on or off your system using strong encryption. Read More >

#4 Data Encryption 101: The Quick Guide to Data Encryption Best Practices

You hear all the time about how important it is to encrypt data. But what does encryption actually mean? Which best practices should you follow when encrypting your data? Which tools are available for data encryption? Read More >

#3 AES vs. RSA Encryption: What Are the Differences?

One thing that’s become abundantly clear in the internet age is that preventing unauthorized people from gaining access to the data stored in web-enabled computer systems is extremely difficult. All it takes is for a worker to click on the wrong link in an email, or respond unwarily to a seemingly legitimate request for information, and an intruder could gain complete access to all your data. In today’s regulatory and public relations environments, that kind of breach can be catastrophic. Read More >

#2 AES vs PGP Encryption: What is the Difference?

In the world of data security there are many different types of encryption, but arguably the two most common are AES and PGP. With so many three-letter acronyms in the technical landscape, it’s easy to get lost in data security conversations. So let’s catch up! Read More >

#1 AES vs. DES Encryption: Why Advanced Encryption Standard (AES) has replaced DES, 3DES and TDEA

Every so often, we encounter someone still using antiquated DES for encryption. If your organization hasn’t switched to the Advanced Encryption Standard (AES), it’s time for an upgrade. To better understand why, let’s compare DES and AES encryption. Read More >

For more information on encryption, our eBook Encryption, Tokenization, and Anonymization for IBM i—A Quick Guide to Protecting Sensitive Data walks you through these essential data-protection technologies and explores the reasons for considering one technology over another in different situations.

Related Posts