Once upon a time, there was a General who was entrusted with maintaining the security of state secrets. In the same state, there also lived an Engineer, who was responsible for developing new technologies using the information controlled by the General. …


The most important principle in engineering any complex system is abstraction. In software engineering this is a very widely used mechanism. Programmers think in terms of services that are provided to them from a lower layer and services that they provide to a higher layer. Take the operating system as…


The past year has had an unprecedented impact on business technology strategies as organizations scrambled to adapt to operating in the COVID-19 pandemic. However, there have also been some seismic shifts in the realm of data privacy and security. In July 2020, the Court of Justice of the European Union…


2021’s SANS Cloud Security Survey has been released and is an important read for security stakeholders within an organization. It is also worth tuning into the panel discussion recording that presented and analyzed the findings if you missed it live. In the panel discussion, Dave Shackleford, SANS analyst and CEO…


The data driven world of finance

How financial firms handle, and store finances and data are a far cry from what it used to be about a decade back. For example, in today’s competitive world banks need to be more data-driven than ever before. This is critical to acquire more customers and deliver the best experiences.


For the last decade, smart devices have become increasingly integrated into our society. But as our reliance on these devices grows, so does the probability and potential impact of security breaches. In a move towards improving platform security, smart device manufacturers have started integrating Trusted Platform Modules (TPM) into their…


The amount of data that organizations handle is growing exponentially, and an increasing proportion of this data is sensitive in some way. …


Any data that can be used by itself or in combination with other pieces of data to uniquely identify a specific individual is considered as Personally Identifiable Information (PII). Traditionally, some of the common examples that have been considered most sensitive PII data are Social Security numbers, mailing addresses, email…


The tech industry is known for a lot of things when it comes to employment within it. Great salaries, amazing benefits, relaxed working atmospheres, cutting edge ideas, the works! …


On 6 April 2021, the data security world took a giant leap forward with the launch by Intel® of its 3rd Generation Intel® Xeon® Scalable Processors — code-named Ice Lake — for use in the next generation of server platforms. As expected, the new processors can handle a range of…

Fortanix

Fortanix™ has created the world’s first runtime encryption solution. Enterprises get provable, portable, and preventive security for their applications!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store