One of my graduate students wrote to me recently about the rash of data losses on unencrypted laptop computers and backup media and asked how I would promulgate policy to cope with the problem. Here’s ...
With all the different hacks, data breaches and loss of personally identifiable information (PII) that are occurring, organizations are being challenged to encrypt their data throughout the data life ...
What's the biggest problem in data security these days? Would you believe it's the widespread use of "trusted servers" to store and secure data, at least according to Amit Sahai, Brent Waters, and ...
The UK Information Commissioner’s Office (ICO) has released updated guidance on encryption following a recent consultation. The revised guidance provides a framework outlining when and how ...
Despite a big push over the past few years to use encryption to combat security breaches, lack of expertise among developers and overly complex libraries have led to widespread implementation failures ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
In the digital age, data security has become a paramount concern for individuals and organizations alike. With cyber threats evolving at an alarming rate, protecting sensitive information is not just ...
Commentary - Data encryption has become a necessary component to most enterprise data security strategies. Enterprises can no longer rely on basic authentication and access control tools to protect ...
In my blog “The Methods of Memory Encryption to Protect Data in Use,” I discussed how the XTS/XEX mode of encryption was the appropriate choice for protecting data stored in and accessed from memory, ...
Today's extremely large and complex ASIC and FPGA designs use significant amounts of third-party intellectual property, in the form of general-purpose processor cores, digital signal processor cores, ...