Author name: Ciphertex Admin

What Is Encryption Security?

Encryption protects data by “scrambling” it into an indecipherable code that can only be unscrambled by an authorized recipient. Though encryption methods and types vary between applications, encryption has become a necessary security measure for almost every digital application. Just how exactly does encryption work, and what are the benefits of adopting it? Read on […]

What Is Encryption Security? Read More »

Ciphertex: Who Are We?

Ciphertex Data Security® is trusted around the globe to provide solutions for data encryption, storage, and transportation. Our products and services are used by military organizations, government agencies, industry leaders, businesses, and personal users. With advanced AES 256-bit encryption technology, these devices are powerful enough to keep even your most sensitive data secure. How do

Ciphertex: Who Are We? Read More »

Data Encryption

In a substitution cipher, single letters, pairs of letters, or groups of three letters (or any combination of these) are changed, but the order of the letters stays the same. Simple substitution ciphers use single letters, whereas polygraphic ciphers use larger groups of letters. In plain terms, letters are substituted for other letters. In the

Data Encryption Read More »

Which Industries Need Reliable Data Security?

As organizations capture and store more data than ever, many industries now adopt data-driven technologies and solutions to streamline workflows and gain new insights. However, these advancements come at a cost: Because much of this data is sensitive, industries must implement reliable data security measures to protect both their operations and their customers Why Is

Which Industries Need Reliable Data Security? Read More »

Cybersecurity Accountability Spread Thin In The C-suite

Cybersecurity Accountability Spread Thin In The C-suite While cybersecurity discussions have permeated board meetings, the democratization of accountability has a long way to go. Cybersecurity Enters the Boardroom—but Lacks Follow-Through A spate of recent surveys offer indications that the philosophy that “cybersecurity is everyone’s responsibility” is gaining steam in the C-suite at most large organizations.

Cybersecurity Accountability Spread Thin In The C-suite Read More »

Nist Special Publication 800-88 Revision 1 Data Sanitation Conformity . . . Without A Sledgehammer!!!

You can put away that sledgehammer now!!! National Institute of Standards and Technology (NIST) SP 800-88 Rev 1 conformity for data sanitation is offered within the Ciphertex SecureNAS® product line. There are three levels of data sanitation defined by the 800-88 standard, Destroy, Clear and Purge. Destroy (aka The Sledgehammer) is exactly what its name

Nist Special Publication 800-88 Revision 1 Data Sanitation Conformity . . . Without A Sledgehammer!!! Read More »

Desjardins, Canada’s largest credit union, announces security breach

Today, Desjardins, Canada’s largest credit union and one of the world’s biggest banks, announced a security breach caused by a former employee. In a statement posted on its website, the bank said a bank employee had taken the data of 2.9 million members (2.7 million home users and 173,000 businesses and associated contacts) from its

Desjardins, Canada’s largest credit union, announces security breach Read More »

Study reveals that the majority of people stull share files and sensitive data via Email, the most vulnerable way to go!!!

A previously released study from a well-known security software source reveals that 75% of survey participants still use email to share files containing sensitive data—even though it remains the least protected, least secure, and most vulnerable method. Data listed by participants included company intellectual property, company financial records, and a vast array of medical information,

Study reveals that the majority of people stull share files and sensitive data via Email, the most vulnerable way to go!!! Read More »

Scroll to Top