Encryption and Data Security Blog
Don’t lift and shift your data protection strategy to the cloud
Data protection for the cloud The data protection program you’ve relied on for years
Is Tokenization Right for your Data?
10 years ago, data-at-rest encryption was adequate for many data security needs. File encryption
How secure is Zoom? Decide for yourself.
How Secure is Zoom? Resources you need to decide
What is a digital fingerprint? Part 2
This is part 2 of the FAQ "What is a Digital Fingerprint?" If you
HN – The first chosen-prefix collision for SHA-1
Secrets From the Future, by MC Frontalot, as mentioned by @WorldMaker. You can’t
How does database encryption work?
Transparent Database Encryption Databases like Oracle, Microsoft SQL Server, Postgres, along with modern document-level