Confidential Computing Beats Homomorphic Encryption for Data Security
For the enterprise, data is like the air we breathe. At the same time, data seems to be indefensible, with data breaches and intellectual property loss a near certainty. New technologies arrive regularly to offer hope that, ultimately, data in use can, in fact, be protected. Homomorphic encryption has emerged ... Read More
Data and the Cat-and-Mouse Game of Security
Security has always been a cat-and-mouse game. Hackers find a way to breach security. Security teams fix the holes and implement new controls. Then bad actors find a way to circumvent those new measures. Rinse and repeat. The odds, unfortunately, are in the attackers’ favor. It’s not a matter of ... Read More
Mitigating Third-Party Supply Chain Breaches
The recent SolarWinds data breach was so pervasive it sent shivers through the industry. Who exactly was affected? How deep were the incursions? What are the long-term implications? How will this impact critical areas of the global supply chain? The unfortunate reality is that while the SolarWinds hack was shocking, ... Read More
Secure Enclaves: Data Protection So Secure, No One Knows About It
Secure enclaves may be the technology that no one has heard of—yet The primary objective of cybersecurity is to protect data. While data security solutions have existed almost since the beginning of mass data creation and collection, they’ve not been all that successful. Breaches continue, as hackers and insiders always ... Read More