Data is one of the most valuable assets for any organization, and the risk of that data being tampered with, stolen or deleted is a fundamental fear. Over the past decade, we've seen an increase in ...
In this episode, Chief Technology Evangelist Jeff DeVerter from Rackspace discusses how businesses can secure their data in the age of AI, aligning daily security tasks with broader business ...
Two areas outside of finance that witness significant fraud in India are organ donation and electoral voter authentication. Plenome Technologies, a start-up incubated by IIT-Madras that recently ...
For end-to-end security of data, it must be secured both when at rest (stored on a connected device) and when in motion (communicated between connected devices). For data at rest, a hardware root of ...
Keeping pace with today’s threats and staying one step ahead of tomorrow’s demands a security architecture that is intelligent, comprehensive, and proactive, writes Girish Dhavale, CTO- Data Center ...
In today’s connected world, where data is a crucial asset in SoCs, Part V of our series explores how to protect and encrypt data, whether at rest, in transit, or in use building on our earlier blog ...
To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources ...
How do you offer a trusted environment for hosting applications and data in the public cloud? It is an area Google’s Nelly Porter is very much focused on. Porter is a director of product management at ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results