State of Encryption Key Management - 2020
By many, encryption is considered the hardest part of data security, and key management the...
22:44
State of Encryption Key Management - 2020
By many, encryption is considered the hardest part of data security, and key management the...
22:44
SQL Server Standard Edition and TDE
Like Microsoft SQL Server Enterprise Edition users, Microsoft SQL Server 2019 Standard Edition...
22:44
Key Management in IBM Cloud for VMware
Running VMware in IBM Cloud provides businesses a way to consolidate legacy infrastructures onto...
23:48
Key Management in IBM Cloud for VMware
Running VMware in IBM Cloud provides businesses a way to consolidate legacy infrastructures onto...
23:48
MySQL Encryption & Managing Keys
MySQL is the world’s most popular open-source database and consequently stores enormous amounts...
24:47
As the world of edge computing becomes more distributed, billions of connected devices live on...
21:46
California Consumer Privacy Act (CCPA) - What You Need to Know
The California Consumer Privacy Act (CCPA) is a big deal. Almost no one is ready for it, so you...
20:09
Don’t Let Your Application or Database Limit Your Encryption Strategy
With the introduction of vSphere encryption in 6.5 and vSAN 6.6, it has become much easier - and...
19:28
Don’t Forget FIPS and Other Fundamental Key Management Features
Over the last several years, encryption key management has attained “essential infrastructure”...
22:48
Protecting Data with vSphere & vSAN Encryption
VMware virtualization has been a game-changing technology for IT, providing efficiencies and...
16:55
GDPR, Encryption, & Right of Erasure
The European General Data Protection Regulation (GDPR) is radically transforming the information...
22:44
IBM i, Two Factor Authentication, and PCI DSS
PCI DSS requiress two factor authentication (also known as multifactor authentication) -...
15:57
Big Data, MongoDB, & Encryption
It is difficult to say big data without instantly thinking about MongoDB. As enterprises adopt...
19:14
Securing the IBM i in the Cloud
While the IBM i (AS/400) is considered by many to be a secure platform, it is not immune to data...
28:07
Identify Escalated Privilege Attacks on IBM i
Cyber criminals attempt to escalate their level of privilege by stealing and using administrative...
16:20
Why Encryption is Critical to Fintech
The financial world is rapidly changing. Innovations in technology are impacting payments,...
22:00
Encryption Requirements for Banks & Financial Services
The finance industry is increasingly being held accountable for the security, confidentiality and...
18:03
HIPAA Compliance, Business Associates, and Data Security
As Covered Entities take electronic Protected Health Information (ePHI) move to the cloud, they...
21:56
The Future of Security Logging on the IBM i
Active monitoring (sometimes referred to as Continuous Monitoring) is one of the most effective...
27:07
IBM i 7.3 Security: New Logs to Collect and Monitor
Active monitoring (sometimes referred to as Continuous Monitoring) is a critical security control...
18:30
Дмитрий Taoist: Ключевые m
Episodio
No.429 第3届图灵奖得主、汉明码发明者
Episodio
A Solid primer on Signals
Episodio