Encryption
Latest about Encryption
![A padlock on a motherboard](https://cdn.mos.cms.futurecdn.net/RFpg7dgKN6R5WUGWMHk6BD-320-80.jpg)
How to encrypt files and folders in Windows 10
By Dale Walker last updated
Tutorials Here’s how to make your sensitive data unreadable to prying eyes
![The words 'The quantum security quandry with ‘quantum security’ highlighted in yellow and the other words in white, against a lightly-blurred render of purple, green, and blue digital waves composed of tiny triangles.](https://cdn.mos.cms.futurecdn.net/KNNxDnap9j7KANbvetxe9N-320-80.jpg)
The quantum security quandary
By Rory Bathgate published
ITPro Podcast Businesses need to get ‘crypto-agile’ to win the quantum arms race
![Google Authenticator logo, which is a grey 'G' stylized to look like a tumbler lock](https://cdn.mos.cms.futurecdn.net/W2wsfffmSmFeevSSUALCiU-320-80.jpg)
Google Authenticator 2FA update accused of making service less secure
By Rory Bathgate published
News Lack of end-to-end encryption in code backup has some developers worried
![The GitHub sign in screen on a smartphone](https://cdn.mos.cms.futurecdn.net/CxxHUnTvnCRzAQoWc6MqDo-320-80.jpg)
Some GitHub users must take action after RSA SSH host key exposed
By Zach Marzouk published
News One cloud security expert likened the incident to the infamous HeartBleed bug from 2014
![An image of encrypted data on a screen](https://cdn.mos.cms.futurecdn.net/yJFJgavypp9fVdfpQShr9N-320-80.jpg)
What is 'steal now, crack later'?
By Keri Allan published
In-depth The rise in quantum computing this decade is pushing cyber criminals into stealing encrypted business data with the hopes of cracking it in the future
![The Gmail logo on a smartphone on top of a keyboard](https://cdn.mos.cms.futurecdn.net/RGdbdhooayWrvdJmHCkBKC-320-80.jpg)
What you need to know about Gmail's new client-side encryption feature
By Ross Kelly published
News The new encryption feature will bolster security and give businesses greater control over access to data
![A person typing on a laptop with their right hand while holding a see through padlock in their left](https://cdn.mos.cms.futurecdn.net/ANRHWZtB9kL4844wb5q3NN-320-80.jpg)
Tips for Boosting your Organisation’s Security Posture with Encryption
By IT Pro published
Sponsored Encryption should be as much a part of your cyber security as firewalls and antimalware
![A graphic of a padlock in a digital blue colour, with effects](https://cdn.mos.cms.futurecdn.net/thCdknGN4MYKQvwnRS6v5Z-320-80.jpg)
What are privacy-enhancing technologies (PETs)?
By Kate O'Flaherty published
In-depth As businesses need to consider privacy now more than ever, privacy-enhancing technologies (PETs) are gaining traction
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.