Viewing entries tagged
cybersecurity

Confusion in China's Cyber Laws

Confusion in China's Cyber Laws

The latest in a wave of sovereign data security laws has emerged from China, causing some alarm with companies trying to understand how it could impact their businesses.  Several sectors are identified as "critical information infrastructure", including telecommunications, information services and finance, who would be required to store personal information and sensitive business data in China.

Cloud Security by the Numbers

Cloud Security by the Numbers

With over 3,000 IT professionals surveyed, the recent Ponemon study sponsored by Gemalto addressed issues concerning the "Global State of Cloud Data Security."  The webcast can be viewed here and the report can be downloaded here.  The participants represented a good cross section of company scale and geographic location around the world.

[Secure] Sharing is Caring

[Secure] Sharing is Caring

Keyword search is enabled on shared data by utilizing a key exchange system based on standard public and secret key cryptography. The _ultra encrypted key architecture allows applications to manage information in vulnerable cloud or on-premise environments while keeping sensitive data unreadable to the infrastructure provider and host.