Encryption has been used through the ages to
protect information, authenticate messages, communicate secretly in the open,
and even to check that messages were properly transmitted and received without having
been tampered with. Now, it’s our first go-to tool for making sure that data
simply isn’t readable, hearable or viewable by enemy agents, smart surveillance
software or other malign actors.
But how does encryption actually work, and how
is it managed? How do we ensure security and protection of our data, when all we
can keep as secret are the keys to unlock it? How do we protect those keys;
i.e., “Who will guard the guards themselves?”
It’s
a big topic that we’re breaking down into three sessions as part of our Storage
Networking Security Webcast Series: Encryption 101, Key Management 101, and Applied Cryptography.
Join
us on May 20th for the first Encryption webcast: Storage Networking
Security: Encryption 101 where our security experts will cover:
- A brief history of Encryption
- Cryptography basics
- Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
- Introduction to Key Management
Leave a Reply