How Employing Encryption for Data Security Changed History

Human history is full of examples of encryption playing pivotal roles in war, competition and transitions of power. Throughout recorded time, people have employed encryption as a tactical tool to keep information private. That data could involve military campaigns, plots to overthrow political leaders or political dealings. In some cases, the use of encryption actually resulted […]

The post How Employing Encryption for Data Security Changed History appeared first on Security Intelligence.

Continue reading How Employing Encryption for Data Security Changed History

Crypto-Risk: Your Data Security Blind Spot

Start thinking about what your organization can do to manage crypto-risk before today’s encryption and security measures fall prey to tomorrow’s attackers and advanced computing tools.

The post Crypto-Risk: Your Data Security Blind Spot appeared first on Security Intelligence.

Continue reading Crypto-Risk: Your Data Security Blind Spot

Ransomware Recovery: Maintain Control of Your Data in the Face of an Attack

Organizations can significantly reduce the risk and cost of ransomware recovery by investing in cloud data protection tools that feature file and object store encryption capabilities.

The post Ransomware Recovery: Maintain Control of Your Data in the Face of an Attack appeared first on Security Intelligence.

Continue reading Ransomware Recovery: Maintain Control of Your Data in the Face of an Attack

When Nobody Controls Your Object Stores — Except You

Object stores are inexpensive and scalable, but how can you be sure your CSP will properly handle your encryption keys? How can you maintain the flexibility to switch CSPs if necessary?

The post When Nobody Controls Your Object Stores — Except You appeared first on Security Intelligence.

Continue reading When Nobody Controls Your Object Stores — Except You

Minimizing the Encryption Blast Radius

The only way to reduce the encryption blast radius is to keep moving forward and embrace the advancements the technology has undergone over the years.

The post Minimizing the Encryption Blast Radius appeared first on Security Intelligence.

Continue reading Minimizing the Encryption Blast Radius

Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes

Data encryption is one of the most basic — and, given the right tools, most effective — ways to protect sensitive information from cybercriminals.

The post Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes appeared first on Security Intelligence.

Continue reading Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes

How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability

It’s critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.

The post How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability appeared first on Security Intelligence.

Continue reading How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability