A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
In December 2019, popular document database MongoDB added a fairly radical new feature to the platform: field-level database encryption. At first glance, one might wonder whether this is a meaningful ...
Baffle has integrated homegrown key management capability with AWS server-side encryption, allowing SaaS applications to isolate and encrypt data at the customer level. SaaS applications running on ...
Facing a blend of old and new regulations, fintech companies, neobanks, and banks-as-a-service use application-level encryption (ALE) to encrypt transaction data, PII, and data sensitive with payments ...
When I was a young man—a long, long time ago now—I worked as an Oracle DBA (Oracle version 6, if you must know). I remember my astonishment at finding out that information in the database was stored ...
Portable SSD encryption protects sensitive data through hardware-level security, authentication, and automatic locking. It ensures files remain unreadable even if devices are lost, stolen, or ...
Level 3 is looking to alleviate a potential access point for enterprise data security breaches: the optical transport network. The company this week unveiled an encryption option for its Wavelength ...
In today’s fast-changing world of business regulations and data security, many leaders face privacy and protection challenges they aren’t fully prepared to handle. Most understand the basics of ...
A friend of mine was wondering why cell-level encryption isn't used often in databases. What would seem to be a fast and efficient approach to data security actually requires a complex implementation.
Brian Greenberg is a CIO/CTO and Partner with Fortium Partners, a firm comprised of the world’s foremost C-level technology leaders. Ransomware is one of the fastest-growing forms of cybercrime. It ...