Fear the NSA or other infiltration threats? We break down different approaches IT pros can take to encrypt data at rest in the public cloud, including service-managed keys, customer-managed keys, bring-your-own keys, and hold-your-own keys.
Hackers got ahold of login credentials for data centers in Asia used by some of the world’s biggest businesses. The magnitude of the data loss highlights the growing risk companies face due to their dependency on third parties to house data.
The “disruptive technology strike force,” led by the Justice and Commerce departments, will use intelligence and data to help identify early threats to trade secrets and protect critical supply chains.