Data-At-Rest

Attesting to the Security of Data-in-Use
The pace at which new confidential computing solutions are penetrating enterprise security architectures and data protection strategies appears to be catching security leaders off balance. COVID-19-accelerated digital transformation saw years’ worth of ...

Encryption Requirements Driven by Data State
Have you ever had that feeling that something is amiss? While conducting research on when data encryption is required, I noticed something that seemed a little off. It is commonplace for regulations ...

Encryption – CISSP Domain 3
We’re circling back to some more CISSP-related materials. Today’s topic will be encryption, which can be found in CISSP Domain 3. By its very nature, encryption is meant to hide the meaning ...

Bringing Real-Time Data Discovery to the Cybersecurity Puzzle
One solution is helping organizations keep data private at rest and in motion, easing the data discovery process and helping organizations meet compliance regulations While protecting consumer privacy has always been a ...