Mitigating Ransomware Attacks – Decoupling Encryption Keys From Encrypted Data
Cloud Native Applications are the Trend but what about Cloud Native Security?
- Select Category
In August, the National Institute of Standards and Technology (NIST) released its blueprint for establishing a Zero Trust security architecture, NIST SP 800-207. The…Read More
Five months ago the European Court of Justice ruled that Privacy Shield did not comply with its citizens’ privacy rights. Known as the…Read More
While ransomware attacks have been around for decades, their frequency has exponentially increased in the last few years, let alone the past several months during the pandemic…Read More
Leveraging DevOps processes, technologies and tools as the means to accelerate business value or experimenting with new ideas and bringing them to market has become mainstream…Read More