Searched for: "securing data at rest"
- Security (29)
- Networking (16)
- Cloud (12)
- Cxo (12)
- Mobility (11)
- Data Centers (8)
- Data Management (7)
- Developer (6)
- Software (6)
- Hardware (5)
- Apple (4)
- Enterprise Software (3)
- Storage (3)
- Tech & Work (3)
- Banking (2)
- Microsoft (2)
- Open Source (2)
- Project Management (2)
- Social Enterprise (2)
- After Hours (1)
- Collaboration (1)
- Google (1)
- Innovation (1)
- Printers (1)
- Virtualization (1)
About 142 results for "securing data at rest"
Bring-your-own-device (BYOD) initiatives have inherent security risks, but trying to create a secure BYOD environment using layers of disparate technologies is ineffective. Find ou...
Microsoft showcased Project GigJam, the Cortana Analytics Suite, uses of HoloLens, and more at its 2015 Worldwide Partner Conference. Get the details.
Mary Meeker, a partner at venture capital firm Kleiner, Perkins, Caufield and Byers, delivered her State of the Internet presentation in May. Here are some highlights.
Data outsourcing has become a trend in the information technology industry because it offers scalability to the enormous amount of digital content stored and generated on a daily b...
Of the 10,000-plus staff at the Government Code and Cypher School during World War II, two-thirds were female. Three veteran servicewomen explain what life was like as part of the ...
Cloud computing provides new visualization to the world. Cloud computing transforms the way by which Information Technology (IT) is consumed and managed, promising improved cost ef...
Don't fall prey to the common pitfalls of working from home. Here are 10 things you can do to stay focused and productive.
"Data encryption is the process of protecting the privacy and confidentiality of data. To provide this protection, professionals frequently look to commonly accepted technologies a...
In a cloud scenario, biggest concern is around security of the data. "Both data in transit and at rest must be secure" is a primary goal of any organization. Data in transit can be...
Improved Independent Access to Encrypted Cloud Databases Supporting Multi-Keyword Synonym Based Queries
Placing critical data in the hands of a cloud provider should come with the guarantee of security and availability for data at rest, in motion, and in use. Several alternatives exi...