From access control to pseudonymization and everything in between – we delve into methods and technologies to help you secure sensitive data in the cloud.
More cyberattackers are targeting organizations' cloud environments, but some cloud services, such as Google Cloud Platform's storage, fail to create adequate logs for forensics.
Fear the NSA or other infiltration threats? We break down different approaches IT pros can take to encrypt data at rest in the public cloud, including service-managed keys, customer-managed keys, bring-your-own keys, and hold-your-own keys.
Hackers got ahold of login credentials for data centers in Asia used by some of the world’s biggest businesses. The magnitude of the data loss highlights the growing risk companies face due to their dependency on third parties to house data.
The “disruptive technology strike force,” led by the Justice and Commerce departments, will use intelligence and data to help identify early threats to trade secrets and protect critical supply chains.