Learn how to use Ionic Machina to protect and control access to your application data. Whether you’re a software development team lead at a prestigious financial institution assigned to redact personally identifiable information (PII) before releasing the next bankruptcy report, or you’re part of a…
30 Results Found - Page 1 of 5
Ben Halpert, VP of risk and corporate security, reduces the risk of insider threats and supply chain breaches with encryption, consistent policy enforcement, and visibility across technical silos.
Ionic Founder Adam Ghetti explores Machina for Google Cloud’s External Key Manager and the components of customer-managed trust: automation, consistency, precision, privacy, security, and simplicity.
On behalf of healthcare providers, Suprit Patel of The Bestige Group interviews Robert Ball about the shared responsibility model; organizations are often not aware that ensuring data protection in the cloud is their responsibility, not the cloud service provider’s.
With the changing data privacy regulations and consumer awareness, learn how you can scale your privacy program by creating synergy between teams and engineering privacy through people, process and technology.
This is an abridged version of a cybersecurity interview Steve Pugh conducted with Aviva Zacks of Safety Detective; you can read the complete interview on their site. As a forward-thinking chief information security officer for Ionic Security, Steve Pugh has taken the lead in deploying a…