night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Mitigating Ransomware Attacks –Decoupling Encryption Keys From Encrypted Data
Rana Gupta
Mitigating Ransomware Attacks – Decoupling Encryption Keys From Encrypted Data

While ransomware attacks have been around for decades, their frequency has exponentially increased in the last few years, let alone the past several months during the pandemic…

Read More
Cloud Native Applications are the Trend but what about Cloud Native Security?
Patricia Brailey
Cloud Native Applications are the Trend but what about Cloud Native Security?

Leveraging DevOps processes, technologies and tools as the means to accelerate business value or experimenting with new ideas and bringing them to market has become mainstream…

Read More
How to Choose the Right Access Management, Authentication and SSO Solution
Danna Bethlehem
How to Choose the Right Access Management, Authentication and SSO Solution

The access management market has been more relevant this year than ever before. The new normal of…

Read More
Secure, Efficient Cloud Data Protection
Eric Wolff
Secure, Efficient Cloud Data Protection

I’m limiting this discussion to public clouds, in particular Infrastructure as a Service and Platform as a Service (IaaS and PaaS), because these are the cloud consumption…

Read More
Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment
Todd Moore
Healthcare Organizations Need to Adapt Their Data Protection Policies to the New Threat Environment

Healthcare providers are at the epicenter of the fight against coronavirus. While the pandemic accelerated their digital transformation initiatives, it also expanded their…

Read More
Is Confidential Computing Ready for Prime Time?
Bob Burns
Is Confidential Computing Ready for Prime Time?

The Promise of Confidential Computing To some, confidential computing is one of the remaining Holy Grails of data security: secure protection of data in use at scale…

Read More