The increasing amount of data we’re all generating is everywhere: in smartphones, laptops, thumb drives, and dozens of online services. How can we secure all of them against unwarranted access? We ...
Recently, my good friend and co-worker Aaron Bertrand and I were producing a video for the upcoming PASS Summit 2015 event. (Learn more about the international SQL ...
After years of data breaches, leaks, and hacks leaving the world desperate for tools to stem the illicit flow of sensitive personal data, a key advance has appeared on the horizon. On Tuesday, MongoDB ...
Databases might be the least sexy thing in tech. Second to that might be encryption. That isn’t stopping Kalepso, a Montreal, Canada-based encrypted database startup that’s trying to fill in the gaps ...
File/operating system level-encryption is actually implemented outside the database engine -- but it's still a form of database encryption. And it's referred to as "transparent" encryption because it ...
Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More Database encryption protects sensitive information by scrambling the data ...
COMMENTARY--When the team from Protegrity, Inc. called the ZDNet offices last week to tell us about its database content encryption software, Secure.Data, my initial reaction was, "Who needs it?" ...
In recent years, there have been numerous data breaches where sensitive data has been leaked. Global data privacy and protection legislation is still poorly enforced, creating confusion and ...
When the team from Protegrity, Inc. called the ZDNet offices last week to tell us about its database content encryption software, Secure.Data, my initial reaction was, "Who needs it?" After all, your ...