On behalf of healthcare providers, Suprit Patel of The Bestige Group interviews Robert Ball about the shared responsibility model; organizations are often not aware that ensuring data protection in the cloud is their responsibility, not the cloud service provider’s.
65 Results Found - Page 1 of 9
Ed Amoroso of TAG Cyber wrote an insightful analysis of Ionic Security, focusing on data access policy management that enables enterprise security.
Protect sensitive data stored on a Raspberry Pi 2 by integrating it with Ionic’s Java SDK for Machina Tools using these step-by-step instructions.
With the changing data privacy regulations and consumer awareness, learn how you can scale your privacy program by creating synergy between teams and engineering privacy through people, process and technology.
This is an abridged version of a cybersecurity interview Steve Pugh conducted with Aviva Zacks of Safety Detective; you can read the complete interview on their site. As a forward-thinking chief information security officer for Ionic Security, Steve Pugh has taken the lead in deploying a…
When people talk about “shifting left” from DevOps to DevSecOps, they’re emphasizing an appdev mindset. They’re not focusing on the machine-scale data these apps create, and that’s a problem.
Learn how you can move unprotected data from CSPs like AWS, GCS or Azure, and protect and store that data on another CSP using this Java example.
Learn different ways to initialize Machina SDK’s Agent class and how that can improve bulk encryption performance.