Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » ISO 27001 » Cryptographic Techniques

Cryptographic Techniques

Cryptographic techniques are used to ensure the confidentiality and integrity of data in the presence of an antagonist. Various cryptographic methods based on the security needs and the threats involved, such as public key cryptography and symmetric key cryptography, can be used during the transit and storage of the data.

Additional reading

CISO tools

CISO Essentials: The Top 5 Tools You Can’t-Miss

The cost of cybercrime is expected to soar by 15% every year, reaching a whopping $10.5 trillion annually by 2025. The real concern now isn’t if a cyberattack will happen but when it will strike. So, how can you protect your organization from this looming threat as a CISO (Chief Information Security Officer)? The key…

Data does not always guarantee visibility. More often than not, CISOs find themselves entangled in a maze of tools offering siloed views of security and performance. And with such skewed views, organizations are often susceptible to blind spots that can be extremely hard to trace and resolve.  With a lack of insightful and actionable data,…

A Complete Guide to FedRAMP Training (2025 Updated)

Cloud security threats are rising. Misconfigurations, breaches, and vendor risks continue to expose sensitive systems. For federal agencies, those risks carry national impact. To safeguard government data in the cloud, the US government enforces strict security requirements through the Federal Risk and Authorization Management Program (FedRAMP). Getting authorized under FedRAMP is a detailed process. Training…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.