night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Secure, Efficient Cloud Data Protection
Eric Wolff
Secure, Efficient Cloud Data Protection

I’m limiting this discussion to public clouds, in particular Infrastructure as a Service and Platform as a Service (IaaS and PaaS), because these are the cloud consumption…

Read More
Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment
Todd Moore
Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment

Healthcare providers are at the epicenter of the fight against coronavirus. While the pandemic accelerated their digital transformation initiatives, it also expanded their…

Read More
Is Confidential Computing Ready for Prime Time?
Bob Burns
Is Confidential Computing Ready for Prime Time?

The Promise of Confidential Computing To some, confidential computing is one of the remaining Holy Grails of data security: secure protection of data in use at scale…

Read More
Real threats for real people - What has the pandemic taught us?
Neira Jones
Real threats for real people - What has the pandemic taught us?

I am a serious podcast consumer. Many times, like most people, I listen to the same podcasts, but every now and then, I look for something new. So I was…

Read More
Financial Services Organizations Need to Adapt their Security Practices to the Shifting Environment
Simon Keates
Financial Services Organizations Need to Adapt their Security Practices to the Shifting Environment

Companies and organizations, whether in the public or in the private sector, are re-establishing their business in the era of information and data revolution. Labelled Industry…

Read More
Strategies and Best Practices for Protecting Sensitive Data
Nisha Amthul
Strategies and Best Practices for Protecting Sensitive Data

Data has been migrating from traditional data centers to third-party hosted environments, private/public cloud infrastructures and Software-as-a-Service (SaaS) applications by…

Read More