Privacy Please is an ongoing series exploring the ways privacy is violated in the modern world, and what can be done about it. Cooper Quintin, a security researcher ...
[The following is excerpted from "Choosing and Implementing an Enterprise Database Encryption Strategy," a new report posted this week on Dark Reading's Database Security Tech Center.] A lot of ...
Data encryption performs two purposes: it protects data against internal prying eyes, and it protects data against external threats (hacking, theft of backup tapes, etc.) Encryption in the database ...
It’s easy to take data security for granted. We’ve all left desktop computers logged in while unattended, momentarily misplaced mobile devices or sent sensitive files via email. However, the internet ...