Privacy-protecting databases use a number of techniques to guard data. The complexity of these techniques has evolved as threats to data privacy have risen ...
The Jericho Forum is an organization pushing for innovation in e-commerce security. In this essay, Joerg Horn, head of gateway solutions at Utimaco, a Jericho Forum member, discusses combining ...
A friend of mine was wondering why cell-level encryption isn't used often in databases. What would seem to be a fast and efficient approach to data security actually requires a complex implementation.
Increasing concerns over security breaches from external and internal threats, regulatory compliance requirements from HIPAA, the HITECH Act, PCI DSS, and other mandates, plus the migration from ...
With database breaches on the rise and auditors getting tougher about data protection practices, the pressure on organizations to encrypt sensitive databases has picked up steam considerably over the ...
Across most database types, in-use encryption is a sticking point when it comes to security and scalability. In-transit and at-rest data encryption are becoming table stakes for most large modern ...
NEW YORK, June 18, 2019 /PRNewswire/ -- MongoDB, Inc. (NASDAQ: MDB), the leading, modern, general purpose data platform, today announced the latest version of its core database, MongoDB 4.2. Key ...
In December 2019, popular document database MongoDB added a fairly radical new feature to the platform: field-level database encryption. At first glance, one might wonder whether this is a meaningful ...
EU lawmakers have just unveiled a wide-ranging counter-terrorism agenda as they set out plans to beef up regional security. The plan touches on some key tech topics — the most keenly watched of which ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results