From fragmented encryption chaos to uniform data protection

Encryption is so critical to enterprise security that it’s almost like air: It’s a necessity, it’s everywhere, and we can’t live without it. On the surface, having encryption everywhere seems like a great idea. However, in many ways the drive to achiev… Continue reading From fragmented encryption chaos to uniform data protection

Can the public cloud become confidential?

It’s been often said that the only two certain things in life are death and taxes. Over the past ten years, it seems data breaches can be added to this list. Can an organization really be completely safe – without fear of losing confidential or r… Continue reading Can the public cloud become confidential?

The next big thing in cloud computing? Shh… It’s confidential

The business-driven explosion of demand for cloud-based services has made the need to provide highly secure cloud computing more urgent. Many businesses that work with sensitive data view the transition to the cloud with trepidation, which is not entir… Continue reading The next big thing in cloud computing? Shh… It’s confidential

Runtime data no longer has to be vulnerable data

Today, the security model utilized by nearly all organizations is so weak that the mere act of creating new data comes with the immutable assumption that such data will become public and subject to theft or misuse. The issues related to data access The… Continue reading Runtime data no longer has to be vulnerable data

Secure enclave protection for AI and ML

You can’t swing a virtual bat without hitting someone touting the value of artificial intelligence (AI) and machine learning (ML) technologies to transform big data and human expertise. A new generation of businesses is promising to accelerate and auto… Continue reading Secure enclave protection for AI and ML

Maximizing data privacy: Making sensitive data secure by default

Maximizing data privacy should be on every organization’s priority list. We all know how important it is to keep data and applications secure, but what happens when access to private data is needed to save lives? Should privacy be sacrificed? Doe… Continue reading Maximizing data privacy: Making sensitive data secure by default