- Select Category
- Archive
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009

The Promise of Confidential Computing To some, confidential computing is one of the remaining Holy Grails of data security: secure protection of data in use at scale…
Read More
As cyber security awareness evolves, large-scale breaches including thefts of personal identifiable information (PII) tends to hit the news. Identity and access management (IAM…
Read More
I am a serious podcast consumer. Many times, like most people, I listen to the same podcasts, but every now and then, I look for something new. So I was…
Read More
Companies and organizations, whether in the public or in the private sector, are re-establishing their business in the era of information and data revolution. Labelled Industry…
Read More
Data has been migrating from traditional data centers to third-party hosted environments, private/public cloud infrastructures and Software-as-a-Service (SaaS) applications by…
Read More
As mentioned in my colleague Charles Goldberg’s blog post earlier this year, “Stop Ransomware in its Tracks with Strong…
Read More