In December 2019, popular document database MongoDB added a fairly radical new feature to the platform: field-level database encryption. At first glance, one might wonder whether this is a meaningful ...
Google unveiled today the new Adiantium storage encryption method for devices without cryptographic acceleration and running Android 9 or later on processors which do not support AES or other crypto ...
An end-to-end strategy must factor in all the ways the data can be input and output, as well as how it’s stored Here’s a sobering prediction: One-third of all adults in the United States will have ...
Synopsys’ Secure Storage Solution for OTP IP introduces a multi-layer security architecture that pairs antifuse OTP technology with SRAM PUF-derived cryptographic keys and an encryption/decryption ...
Firmware updates won’t address the problem, so admins need to take other action. Self-encrypting solid-state storage drives from Samsung and Crucial are open to tampering that would allow an attacker ...
Brian Greenberg is a CIO/CTO and Partner with Fortium Partners, a firm comprised of the world’s foremost C-level technology leaders. Ransomware is one of the fastest-growing forms of cybercrime. It ...
Data encryption performs two purposes: it protects data against internal prying eyes, and it protects data against external threats (hacking, theft of backup tapes, etc.) Encryption in the database ...
Storage administrators have a number of possible options when looking to secure NAS and iSCSI IP-enabled storage devices, and deployment scenarios are a key factor in choosing the appropriate methods.
Implementing Application Level Encryption at Scale: Insights from Atlassian’s Use of AWS and Cryptor
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Dell on Wednesday launched Dell Data Protection Encryption software. Targeted to SMBs and enterprise customers, Dell claims it provides flexible, manageable and auditable endpoint encryption while ...
Facing a blend of old and new regulations, fintech companies, neobanks, and banks-as-a-service use application-level encryption (ALE) to encrypt transaction data, PII, and data sensitive with payments ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results