What do you do when you need to perform computations on large data sets while preserving their confidentiality? In other words, you would like to gather analytics, for example, on user data, without ...
Encryption is the process of converting readable data, known as plaintext, into a jumbled string of data called ciphertext. Encryption algorithms use mathematical operations to scrabble data, making ...
You probably store all kinds of sensitive information on your personal computer – or your smartphone, for that matter. For good measure, you may even store your data in the cloud. And like the ...
Data storage security covers a wide landscape, including legal compliance, e-discovery, user access control and the physical security of data storage media. In this article we will focus on ...
In today’s fast-changing world of business regulations and data security, many leaders face privacy and protection challenges they aren’t fully prepared to handle. Most understand the basics of ...
Data is the new gold. Today, all businesses, whether large or small, collect, store, receive or transmit data to a certain degree. And irrespective of which device, technology, or process is used to ...
The increasing amount of data we’re all generating is everywhere: in smartphones, laptops, thumb drives, and dozens of online services. How can we secure all of them against unwarranted access? We ...
Data breaches are now the new norm and have reached epidemic proportions. Whether you work for a government agency, financial institution, health care company or private corporation, no organization ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Swiss public-sector data protection officers say controlling the geographic location of cloud data isn’t enough: governments must hold the encryption keys too. Data residency is no longer enough. As ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results