Understanding encryption and key management

Share this article:

Organizations need to be in the habit of securing sensitive data using encryption, but that is the easy part. Key management is really the name of the game. If an organization loses its encryption key, it may never be able to decrypt its own data, and if it loses its key to an attacker, then all that data is at risk of being misused.

In this video, Richard Moulds, VP strategy with Thales e-Security, speaks with SC Magazine reporter Adam Greenberg on how encryption works and how to improve key management.

Share this article:

More in Videos

Applying the cyber kill chain

In this video, SC Magazine chats with Chandra McMahon of Lockheed Martin on ways organizations can leverage the cyber kill chain in order to improve their detection, mitigation, and defense posture.

The evolving role of the CSO

In this video, SC Magazine's Danielle Walker interviews Trey Ford, global security strategist at Rapid7, to discuss the rapidly changing role of the CSO.

Added authentication in today's workplace

In this video interview, Dug Song, CEO of Duo Security, discusses the impact of two-factor authentication and its deployment in the workplace, as well as the effect that wearables will have on the enterprise in the future.