News

Using data encryption will ensure that third-party applications do not have access to your organization’s sensitive data and information. The apps will only have access to the information you allow.
Identify sensitive data, and take steps to ensure it’s always encrypted. Use monitoring tools to expose suspicious activity and unauthorized attempts to access data, and flag them.
We develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, ciphertexts are labeled with sets of ...
Even if you set out good policies around data control, based around knowing what you have, with encryption and access control within the boundaries of your organisation, the nature of modern ...
The evolution of cloud computing has accelerated the need for robust security mechanisms, with access control and encryption forming a fundamental duo in protecting data and resources ...
Vormetric, a provider of enterprise system encryption solutions, plans to announce tomorrow Vormetric Data Security for Amazon EC2, which enables organizations to remotely apply and manage transparent ...
This white paper outlines how to use Vormetric Transparent Encryption to meet PCI DSS 3.0 Requirements with Data-at-Rest Encryption, Access Control and Data Access Audit Logs in traditional server ...
Microsoft SEAL—powered by open-source homomorphic encryption technology—provides a set of encryption libraries that allow computations to be performed directly on encrypted data.This enables software ...
Proactively applying private- or public-key encryption coupled with access control won't eliminate data breaches. But it will make it harder for the bad guys to take advantage of you.