SQL Server 2005's engine-based, data-encryption functions protect confidential information from unauthorized access and disclosure, and offer native key management as a bonus. Reports of more than 2 ...
Data storage security covers a wide landscape, including legal compliance, e-discovery, user access control and the physical security of data storage media. In this article we will focus on ...
Steve Orrin is the federal CTO for Intel Corporation. He has held architectural and leadership positions at Intel, driving strategy and projects on identity, anti-malware, HTML5 security, cloud and ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Confidential computing focuses on potentially revolutionary technology, ...
Swiss public-sector data protection officers say controlling the geographic location of cloud data isn’t enough: governments ...
You probably store all kinds of sensitive information on your personal computer – or your smartphone, for that matter. For good measure, you may even store your data in the cloud. And like the ...
One of the biggest stumbling blocks for companies contemplating entrusting a cloud-computing vendor with their data is the risk of unintended data exposure. A lot of data is sensitive. It might ...
This past November, federal investigators cracked the largest identity theft ring yet, a scheme that stole credit histories of 30,000 people from the computer systems of credit agencies, resulting in ...
Forbes contributors publish independent expert analyses and insights. Gil Press writes about technology, entrepreneurs and innovation. Almost 60% of the adult population in the U.S. found out recently ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...