Question

  • Creator
    Topic
  • #4298150

    Feb 2014 – Encryption, Key Management, and Consolidation

    Locked

    by hbilman ·

    Hi,

    We have been updating our Encryption, Key Management, and Consolidation in Today’s Data Center and your latest version is from Feb 2014. Is there any intention to update this as a lot has changed since then?

    Thanks

All Answers

  • Author
    Replies
    • #4298168
      Avatar photo

      I’d like to see updates for US Agencies and how to defend DOGE attacks.

      by rproffitt ·

      In reply to Feb 2014 – Encryption, Key Management, and Consolidation

      So yes, a lot has changed but can you theorize how to defend against the new DOGE data attacks?

      As it stands it appears the best defenses are:
      1. Move away with your data to other locations.
      2. Know how to cut power to the building as soon as the attack begins.
      3. Have fake databases at the ready so the DOGE databases become polluted.

      Be safe, fight back.

    • #4298227
      Avatar photo

      Reply To: Feb 2014 – Encryption, Key Management, and Consolidation

      by birdmantd ·

      In reply to Feb 2014 – Encryption, Key Management, and Consolidation

      Who is the “we” and “your” that you are referring to in this thread? I have no idea who you are referring to or why you need to know.

    • #4300474

      Reply To: Feb 2014 – Encryption, Key Management, and Consolidation

      by DediRock ·

      In reply to Feb 2014 – Encryption, Key Management, and Consolidation

      A lot has changed since 2014! If security is a concern, consider updating to modern standards like Zero Trust and hybrid cloud encryption.

    • #4311753

      Reply To: Feb 2014 – Encryption, Key Management, and Consolidation

      by henryjulian086 ·

      In reply to Feb 2014 – Encryption, Key Management, and Consolidation

      Great points, @rproffitt!

      DOGE attacks are definitely pushing the boundaries of what we thought possible in data exfiltration. Your defensive strategies are solid — especially the decoy database idea, which adds a clever layer of misdirection.

      I’d also add:
      4. Rotate encryption keys frequently with automated key lifecycle policies.
      5. Monitor for unusual data access patterns in real-time — behavior analytics is key.
      6. Isolate critical systems from general network access where possible.

      Stay vigilant — and yes, fight back smart.

Viewing 3 reply threads