Posted on 23 August 2017 by
How do we provide a level of data control that is compliant with GDPR? Enter Encryption and key management. Ultimately, with encryption, only key holders are capable of accessing data; this is the way organizations restrict encryption key access and ultimately control the data.
Posted on 28 June 2012 by
Following on from our recent post on who is responsible for the security function, here is the second in our series of posts revealing the results of our research into the attitudes of CIOs. Next on our agenda is the above question from Ardaman Kohli. It’s true that it doesn’t matter how secure CIOs themselves […]