There are several different ways to encrypt data stored within databases -- some residing inside the database, others outside. You can encrypt data programmatically at the application layer or at the ...
The Jericho Forum is an organization pushing for innovation in e-commerce security. In this essay, Joerg Horn, head of gateway solutions at Utimaco, a Jericho Forum member, discusses combining ...
Data breaches and exposures have become so common these days, it's difficult to keep track of them all, much less step back to mull a solution. But, perhaps out of necessity, researchers from the ...
Privacy-protecting databases use a number of techniques to guard data. The complexity of these techniques has evolved as threats to data privacy have risen ...
A friend of mine was wondering why cell-level encryption isn't used often in databases. What would seem to be a fast and efficient approach to data security actually requires a complex implementation.
Across most database types, in-use encryption is a sticking point when it comes to security and scalability. In-transit and at-rest data encryption are becoming table stakes for most large modern ...
SANTA CLARA, Calif.--(BUSINESS WIRE)--Vormetric, Inc., the leader in data security management and enforcement solutions, announced today that TRX (NASDAQ: TRXI), a global technology company that ...
Increasing concerns over security breaches from external and internal threats, regulatory compliance requirements from HIPAA, the HITECH Act, PCI DSS, and other mandates, plus the migration from ...
In December 2019, popular document database MongoDB added a fairly radical new feature to the platform: field-level database encryption. At first glance, one might wonder whether this is a meaningful ...
EU lawmakers have just unveiled a wide-ranging counter-terrorism agenda as they set out plans to beef up regional security. The plan touches on some key tech topics — the most keenly watched of which ...