Fear the NSA or other infiltration threats? We break down different approaches IT pros can take to encrypt data at rest in the public cloud, including service-managed keys, customer-managed keys, bring-your-own keys, and hold-your-own keys.
We look at two widely used on-prem backup strategies – grandfather-father-son and 3-2-1 – and explore their relevance in the world of public clouds.