Considerations Around Application Encryption
For years, the use of encryption to protect data-at-rest on computers within the enterprise was solely the responsibility of developers who coded the applications that …
CyberSecurity Strategist | Advisor | Evangelist | Consultant | Hands-On Technologist | Human Router
For years, the use of encryption to protect data-at-rest on computers within the enterprise was solely the responsibility of developers who coded the applications that …
President and CEO of Vormetric, Alan Kessler, blogged earlier this week concerning the far-reaching impacts of the Target breach – reflections from almost two years …
It’s been said that those who don’t learn from history are doomed to repeat it. In my last article, I wrote metaphorically about the medieval …