Encryption has been used through the ages to protect stored secrets, authenticate messages, communicate secretly in broad daylight, and even to check that messages were properly transmitted and received without tamper. Now, it’s often our first go-to tool for making sure that data simply isn’t readable to prying eyes, ears or AI bots.
But how does encryption actually work, what makes it tick, and how is it managed? How do we ensure compatibility? How do we protect the keys; i.e., “Who will guard the guards themselves?”
It’s a big topic that we’re breaking down into three parts: Encryption 101, Key Management 101, and Applied Cryptography.
Join us on May 20th for the first encryption webcast: Storage Networking Security: Encryption 101 where security experts will cover:
•A brief history of Encryption
•Cryptography basics
•Definition of terms – Entropy, Cipher, Symmetric & Asymmetric Keys, Certificates and Digital signatures, etc.
•Introduction to Key Management
After you watch the webcast, check out the Encryption 101 Q&A blog at https://bit.ly/2ZGMisl