In our blog, we have talked about the ways of how to secure cloud computing and touched upon the topic of encrypting. We found that it is a topic that deserves a whole separate article to describe it ...
Data storage security covers a wide landscape, including legal compliance, e-discovery, user access control and the physical security of data storage media. In this article we will focus on ...
Steve Orrin is the federal CTO for Intel Corporation. He has held architectural and leadership positions at Intel, driving strategy and projects on identity, anti-malware, HTML5 security, cloud and ...
Data is the new gold. Today, all businesses, whether large or small, collect, store, receive or transmit data to a certain degree. And irrespective of which device, technology, or process is used to ...
This past November, federal investigators cracked the largest identity theft ring yet, a scheme that stole credit histories of 30,000 people from the computer systems of credit agencies, resulting in ...
What do you do when you need to perform computations on large data sets while preserving their confidentiality? In other words, you would like to gather analytics, for example, on user data, without ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
To encrypt or not to encrypt, that is the question. Well, you should of course be encrypting data in motion particularly where it’s to be carried over a third party network such as the internet or the ...
Data breaches are now the new norm and have reached epidemic proportions. Whether you work for a government agency, financial institution, health care company or private corporation, no organization ...
Microsoft has helpfully provided a real-world example showing why mandating "back doors" so that authorities can bypass encryption to access digital data is a very bad idea. The fact that this example ...