
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Cj857Weqic\"><a href=\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/\">Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/decrypting-the-world-of-encryption-part-3-experts-cover-encryption-at-the-hardware-and-storage-level\/embed\/#?secret=Cj857Weqic\" width=\"600\" height=\"338\" title=\"&#8220;Decrypting the World of Encryption, Part 3: Experts Cover Encryption at the Hardware and Storage Level&#8221; &#8212; OTAVA\" data-secret=\"Cj857Weqic\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"After deep dives into the world of encryption as it relates to privacy, security and compliance and how it functions at the software level, Online Tech\u2019s \u201cTuesday at 2\u201d webinar series concluded its three-part encryption presentation with a look at encryption at the hardware and storage levels. Online Tech\u2019s Systems Support Manager Steve Aiello led the conversation and handled aspects of encryption for Microsoft-driven hardware and guest co-host Mark Stanislav of Duo Security took over for the Linux-focused stretch of the presentation. Both explored the variety of places encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ. To wrap up the presentation, Aiello covered encryption options for storage media. What follows is a brief recap of their presentation. If you want to learn more, slides and a video replay of the 57-minute presentation are available here. The slides offer numerous links to suggested reading from Aiello. While handling a look at both its Encrypting File Systems (EFS) and BitLocker disk encryption offerings, Aiello noted that \u201cMicrosoft has generally done a very good job at implementing cryptography in their ecosystem.\u201d EFS uses AES, a very..."}