Data Protection

Azure Confidential Computing

Azure finally turned their confidential computing offerings generally available. In this blog post,...

Read More

Data Protection

The Importance of Efficient Data Classification to Cloud Migration

Companies that fail to properly manage their data are compromising their own success. Learn more...

Read More

Cloud Encryption Data Protection

The 4 Untold Pains of Data Protection Solutions

In order to determine if a data protection solution is compatible to your organization, there are 4...

Read More

Data Protection

Unpacking Microsoft Azure Cosmos DB Encryption Limitations

Cosmos DB encryption service offers some good features but there are limitations when integrating...

Read More

Cloud Encryption Data Protection

The Gap Between HSM Security and Cloud Environment Needs

Companies want a ‘hardware’ degree of security and a ‘software’ degree of usability. Learn more...

Read More

Data Protection

Protect Your Cloud DR Workloads using Kindite’s Runtime Encryption

Disaster recovery is a critical business requirement. In this blog post, we unpack the challenges...

Read More

Data Protection

Confidential Computing for Cloud Data Protection-Dr Jekyll or Mr Hyde?

TEEs has have been raising interest lately. In this blog post, we will analyze the advantages and...

Read More

Data Protection

AWS KMS vs AWS CloudHSM

In this blog post, we review AWS solutions - KMS and CloudHSM. We compare both services from a...

Read More

Data Privacy Data Protection

5 Things CIOs Need to Know About BDSG-new

BDSG is not one of the shiniest or newest of privacy regulations. However, CIOs have to get...

Read More

Cloud Encryption Data Protection

Cloud Data Protection - Let it Flow

When companies choose to store data in the cloud, they also assume the responsibility for securing...

Read More
1

Subscribe to our newsletter

 

1