The Jericho Forum is an organization pushing for innovation in e-commerce security. In this essay, Joerg Horn, head of gateway solutions at Utimaco, a Jericho Forum member, discusses combining ...
The company's recent 2016 Vormetric Data Threat Report revealed that across nearly all geographies, 57 percent of respondents noted “complexity” was the number-one barrier to adopting data security ...
In today’s fast-changing world of business regulations and data security, many leaders face privacy and protection challenges they aren’t fully prepared to handle. Most understand the basics of ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Database encryption protects sensitive information by scrambling the data ...
In today’s digital economy, where organizations rely on cloud computing, mobile technologies and data-driven decision making, securing sensitive information has never been more critical. Encryption ...
I recently spoke with the MongoDB team about the much-anticipated MongoDB version 7. One feature they were particularly interested in discussing was Queryable Encryption. Let's delve into this feature ...
Steve Orrin is the federal CTO for Intel Corporation. He has held architectural and leadership positions at Intel, driving strategy and projects on identity, anti-malware, HTML5 security, cloud and ...
Data encryption performs two purposes: it protects data against internal prying eyes, and it protects data against external threats (hacking, theft of backup tapes, etc.) Encryption in the database ...
Skyhigh Networks, Inc., announced today that it has received a patent for using a hosted gateway to encrypt and decrypt data moving between users and cloud services such as Office 365, but some ...
As hackers become increasingly sophisticated, they are targeting our personal data and stealing it at unprecedented rates. As a result, too many of us have received notices telling us our data has ...