When writing code that deals with sensitive information like passwords or payment data, it's important to zeroize memory when you're done with it. Failing to do so can leave sensitive in memory even after the program is terminated and even end up on disk when the computer uses swap.
Large enterprises face especially difficult data protection challenges posed by the scale and diversity of the data they collect and store, the complexity of enterprise organizational structures, the likelihood of facing targeted attacks, and the difficulty in coordinating thousands of employees to move quickly to mitigate risks.
The effectiveness of your data governance program is determined by how much care and attention you put into the design of its strategy.
This article will introduce to some PostgreSQL best practices you can implement for access and storage security.
We built CipherStash to make it easy to protect sensitive data with searchable encryption. Until now, that has meant moving your data to a CipherStash-managed database.
Optus just had Australia's biggest ever data breach. Here's what might have happened and how it could have been prevented.
It turns out there’s heaps we can learn from API security improvements and apply to databases. Here are the top 3!
The OWASP Top 10 has recently been updated, and it has recognised Cryptographic Failures as the #2 vulnerability category.
I spoke to host, Sam Brown about why CipherStash could be a gamechanger for enterprise data security.
We are excited to announce that Dr David Wu, Assistant Professor at the University of Virginia, has joined CipherStash as an official advisor
With data breaches continuing to threaten our privacy and data security, are current data protection schemes enough?