
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Online Tech's Data Security Video Series: What is Data Encryption?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Bd89XiixvU\"><a href=\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/\">Online Tech&#8217;s Data Security Video Series: What is Data Encryption?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/embed\/#?secret=Bd89XiixvU\" width=\"600\" height=\"338\" title=\"&#8220;Online Tech&#8217;s Data Security Video Series: What is Data Encryption?&#8221; &#8212; OTAVA\" data-secret=\"Bd89XiixvU\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Online Tech&#8217;s Senior Product Architect Steve Aiello leads a data security series of videos on data encryption by explaining what it is and the history of the process. Watch the full video on our site. Data encryption has been around since the Ceasar Cipher, an algorithm used in the Roman times. Encryption is scrambling data that is unreadable to people that do not have the key. Aiello describes how a key is the map to the encrypted data (cipher text) that is decrypted into plain text. It is used to keep unauthorized people from viewing sensitive data. Learn more about encryption of data at rest and in transit on our Defense in Depth page. The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0encryption in the cloud. Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0full arsenal of security services\u00a0for a layered-defense approach to ensuring data is protected, even if...","thumbnail_url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg"}