In December 2019, popular document database MongoDB added a fairly radical new feature to the platform: field-level database encryption. At first glance, one might wonder whether this is a meaningful ...
A friend of mine was wondering why cell-level encryption isn't used often in databases. What would seem to be a fast and efficient approach to data security actually requires a complex implementation.
Brian Greenberg is a CIO/CTO and Partner with Fortium Partners, a firm comprised of the world’s foremost C-level technology leaders. Ransomware is one of the fastest-growing forms of cybercrime. It ...
Facing a blend of old and new regulations, fintech companies, neobanks, and banks-as-a-service use application-level encryption (ALE) to encrypt transaction data, PII, and data sensitive with payments ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Portable SSD encryption protects sensitive data through hardware-level security, authentication, and automatic locking. It ensures files remain unreadable even if devices are lost, stolen, or ...
Most organizations that rely on computing systems understand the need to protect data against cyber-attacks and data breaches by using encryption. Unfortunately, even the most well-informed and ...
When I was a young man—a long, long time ago now—I worked as an Oracle DBA (Oracle version 6, if you must know). I remember my astonishment at finding out that information in the database was stored ...
MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--Fortanix® Inc., the Runtime Encryption® company, today announced that the Fortanix Self-Defending Key Management Service™ (SDKMS) has earned the Federal ...
A new ransomware strain is implementing a troubling but so far relatively rarely used technique to encrypt data in a target environment. Instead of encrypting files on endpoint systems like most ...