Dec 11, 2021Healthcare is one industry that hasn’t been served particularly well by AI. But due to the innovation of confidential computing, clinical AI algorithms are on the rise and poised to improve healthcare for years to come. Ambuj Kumar, CEO of Fortanix, elaborates on the future of AI in this exclusive article for Toolbox.
Dec 23, 2020Ambuj Kumar is CEO of Fortanix, data-first multicloud security company that solves cloud security and privacy, using Confidential Computing.
Dec 9, 2020Fortanix announced Fortanix Cloud Data Control, a new solution that helps businesses secure private data as they migrate to public cloud. Available for use across AWS, Google Cloud, and Microsoft Azure - it is the only solution on the market that can apply consistent encryption key management policies across multiple cloud providers, tenants, and regions while enabling keys from any cloud or on-premises Hardware Security Module (HSM) to encrypt data anywhere.
Dec 1, 2020While valuable, secrets management also can be difficult for DevOps teams to employ. Here’s what you need to know
Nov 25, 2020Tech companies are offering this emerging technology to help financial institutions secure data while it is being processed.
Nov 18, 2020In this article, we will take a closer look at Google’s Cloud Key Management Services. When users store data into Google Cloud, the data is automatically encrypted at rest. We use Google’s Cloud Key Management service to gain better control over managing the encrypted data-at-rest and encryption keys.
Nov 16, 2020What is confidential computing? There are ways to encrypt your data at rest and while in transit, but confidential computing protects the confidentiality and integrity of your data while it is in use.
Nov 11, 2020With its Self-Defending Key Management Service, Fortanix offers a unified management approach covering encryption, keys, secrets and tokenization. The service, which spans multi-cloud infrastructures, provides cryptographic operations and life-cycle management such as key generation and key rotation.
Nov 1, 2020Fortanix is a startup that offered the first commercially available runtime encryption back in 2017 using Intel® SGX (a set of security-related instruction codes that are built into some modern Intel central processing units).
Oct 29, 2020We didn't have to do what we did to TikTok. We turned it into a political football that was kicked back and forth, with no real solution in sight.
Oct 26, 2020Above the Trend Line: your industry rumor central is a recurring feature of insideBIGDATA. In this column, we present a variety of short time-critical news items grouped by category such as M&A activity, people movements, funding news, industry partnerships, customer wins, rumors and general scuttlebutt floating around the big data, data science and machine learning industries including behind-the-scenes anecdotes and curious buzz.
Oct 23, 2020Here are 11 recent partnerships between healthcare organizations and big tech companies including Amazon, Apple, Google and Microsoft.
Oct 15, 2020From new partnerships to asset sales to novel cybersecurity initiatives, here's the latest roundup of stories about health IT companies, including Epic, Allscripts and Amazon.
Oct 15, 2020The upcoming 3rd Gen Xeon Scalable processor will widely expand applicability of Intel SGX secure enclaves in data centers.
Oct 14, 2020Intel SGX and Fortanix Confidential Computing Enclave Manager were leveraged by NEC to create a confidential computing system to more securely share, analyze and manage customer data, while also facilitating better collaboration with partners.
Oct 14, 2020The University of California San Francisco’s (UCSF) Center for Digital Health Innovation (CDHI) is using Intel® Software Guard Extensions (Intel® SGX) featured in Intel® Xeon® E processors and Fortanix® Confidential Computing Enclave Manager to help streamline certification of breakthrough medical devices with embedded artificial intelligence (AI) capabilities.
Oct 14, 2020New Security Innovations Include Intel SGX, Memory Encryption, Firmware Resilience and Breakthrough Cryptographic Accelerators
Oct 14, 2020Now we‘re really bringing it to the [Xeon] Scalable processors for the first time, in a much bigger way,’ an Intel fellow tells CRN of the expanded security capabilities for the upcoming third-generation Xeon Scalable processors, which includes Total Memory Encryption and larger Intel SGX enclaves.
Oct 14, 2020Today, Intel unveiled key security innovations for its upcoming 3rd Generation Intel Xeon platform—codenamed “Ice Lake.” The new security capabilities include Intel Software Guard Extension (SGX), Intel Total Memory Encryption (Intel TME), Intel Platform Resilience (Intel PFR), and cryptographic accelerators that improve data confidentiality and integrity overall.
Oct 12, 2020UCSF, in partnership with Fortanix, Intel, and Microsoft, will announce BeeKeeperAI, a Privacy-Preserving Analytics Platform that will accelerate the development of clinical AI algorithms by 1000X (from 30 months to 1 day).
Oct 9, 2020UC San Francisco’s Center for Digital Health Innovation (CDHI), Fortanix, Intel, and Microsoft Azure have formed a collaboration to establish a confidential computing platform with privacy-preserving analytics to accelerate the development and validation of clinical algorithms.
Oct 8, 2020The data analytics platform will protect the privacy of clinical information to accelerate artificial intelligence in healthcare.
Oct 8, 2020Advanced Development of Additive Manufacturing, a 3D-bioprinting company headquartered in Groton, Conn., has been pioneering an on-demand tissue manufacturing solution as a service model.
Oct 8, 2020University of California San Francisco teamed Microsoft Azure, Intel and Fortanix to establish a confidential computing platform that will accelerate the development and validation of clinical algorithms.
Oct 7, 2020The organizations say they expect the platform, announced Wednesday, to reduce the time and cost associated with creating clinical grade AI algorithms while maintaining data security.
Oct 5, 2020According to Gartner, 81 percent of businesses are adopting a hybrid cloud and multi-cloud strategy. The challenges of protecting data and using encryption across public/private cloud, SaaS, and on-premises environments increase complexity, cost and security risk.
Oct 5, 2020The Confidential Computing Consortium, formed under The Linux Foundation, could revolutionize the way companies share data. Tom Merritt lists five things to know about Confidential Computing.
Oct 1, 2020Customers deploying applications in the cloud face major security challenges today. Cloud providers treat cloud security as a mutual obligation. The cloud providers are responsible for the infrastructure security of the cloud, and the customer covers the security of what data and application they put in the cloud.
Oct 1, 2020Fortanix, the data-first multicloud security™ company, announced that it is partnering with VMware to integrate Fortanix Self-Defending Key Management Service (KMS) with VMware Cloud Director™ to enable VMware cloud partners to deliver a broad set of differentiated data security services focused on better securing data throughout its lifecycle.
Sep 30, 2020SAN FRANCISCO, September 30th, 2020 – Fortanix® Inc., the data-first multicloud security™ company, today announced that it is partnering with VMware to integrate Fortanix Self-Defending Key Management Service (KMS) with VMware Cloud Director™ to enable VMware cloud partners to deliver a broad set of differentiated data security services focused on better securing data throughout its lifecycle.
Sep 14, 2020According to the Confidential Computing Consortium: “Confidential computing is the protection of data in use using hardware-based Trusted Execution Environments (TEE). A Trusted Execution Environment is commonly defined as an environment that provides a level of assurance of data integrity, data confidentiality, and code integrity. A hardware-based TEE uses hardware-backed techniques to provide increased security guarantees for the execution of code and protection of data within that environment.”
Jul 30, 2020Securing data while in use opens doors from the on-prem data center to the cloud for more applications. According to a survey at June's Linux Foundation Open Source Summit by the Confidential Computing Consortium, only 30 percent of attendees have heard of the technology, but it’s promising to change the way the more security-conscious organizations view public cloud infrastructure.
Jul 28, 2020In most industries, businesses are evaluating and kicking off digital transformation initiatives to see how they might gain competitive advantage, improve customer experience, and increase profitability. In many cases, technology can be used in digital transformation to create new business models, digitize records, or leverage machine learning and artificial intelligence to improve results.
Jul 28, 2020In the battle for security budget funding, enterprise key management isn’t nearly as sexy as technologies such as threat hunting or blockchain cybersecurity. Nevertheless, a key management system (KMS) is a behind-the-scenes workhorse that manages and protects the very keys that can open the kingdom.
Jul 24, 2020As part of CRN’s Emerging Vendors for 2020, here are 55 hot security startups, founded in 2014 or later, that solution providers should be aware of.
Jul 20, 2020Cloud technology companies are betting that businesses worried about being hacked will adopt a new computing technique to safeguard their most valuable information.
Jul 20, 2020The hackers insinuated their way deep into Twitter’s internal system. They were able to get into a position from which they could access some 350 million Twitter accounts, including numerous accounts of the rich and famous. Ambuj Kumar's (Fortanix CEO) comments on recent hi-profile Twitter hack.
Jul 16, 2020Twitter was thrown into chaos on Wednesday after accounts for some of the world’s most recognizable public figures, executives and celebrities starting tweeting out links to bitcoin scams. Twitter says the attack happened because someone tricked or coerced an employee into providing access to internal Twitter administrative tools. This post is an attempt to lay out some of the timeline of this attack, and point to clues about who may have been behind it.
Jul 2, 2020Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully migrating and operating in public clouds. AWS Lambda, Azure Functions and Google Cloud are today’s market leading platforms for enterprises to realize the power and benefits of FaaS.
Jun 30, 2020The Confidential Computing Consortium, a Linux Foundation project and community dedicated to defining and accelerating the adoption of confidential computing, has announced Accenture, AMD, Anjuna, Anqlave, Cosmian, Facebook, iExec, IoTeX, Mellanox, NVIDIA, Oracle and R3 have joined as members of the Confidential Computing Consortium to contribute to the adoption of Confidential Computing.
Jun 30, 2020Fortanix is a consistent innovator in runtime encryption. They have recently concluded a collaboration with the Google Cloud Platform (GCP) that delivers an External Key Management System (EKMS) for the public cloud. The resulting solution enables businesses to migrate sensitive, private data to a public cloud environment without requiring them to give up control of their encryption keys.
Jun 29, 2020Linux Foundation’s Confidential Computing Consortium formed nine months ago, has grown 60% since then and added 10 new members in the last five months. Its other new members include Anjuna, Anqlave, Cosmian, iExec, IoTeX, and R3. They join founding members Alibaba, Arm, Google Cloud, Baidu, ByteDance, decentriq, Fortanix, Huawei, Intel, Kindite, Microsoft, Oasis Labs, Oracle, Red Hat, Swisscom, Tencent, and VMware.
Jun 29, 2020While no one holds a crystal ball, it’s pretty easy to look at the numerous data privacy regulations both around the globe, and in individual US states, and see the growing trend around protecting data privacy and enforcing compliance. More and more regulatory bodies are establishing regulations to protect consumers’ personal data and confidential information that is used in organizations.
Jun 26, 2020What is confidential computing, and how can it help protect organisations? In this week’s episode, we talk to Dr Richard Searle, senior security architect at Fortanix and general member’s representative to the governing board of the consortium, about what the technology aims to do.
Jun 16, 2020Fortanix® Inc, a Runtime Encryption® company has expanded operations in the Asia Pacific region, fulfilling the growing global demand for its data security solutions. Having invested heavily in Asia Pacific, the company recently unveiled a new in-region staff and growing ecosystem of channel and distribution partners, enabling organisations to improve on-premises and cloud data security, all while lowering costs and reducing complexity of legacy systems.
Jun 16, 2020Fortanix has expanded its operations in the Asia Pacific region to continue meeting the growing global demand for its data security solutions.
Jun 16, 2020Data security solutions vendor Fortanix is gearing up for a fresh run at the Asia Pacific market, launching a new expansion effort in the region, signing new distribution agreements and recruiting new partners to take its solutions to market. Inks distribution deals with ACA Pacific, Nextgen Distribution, Vietsoft and i-Value, among others.
Jun 3, 2020Confidential computing is an emerging industry initiative focused on helping to secure data in use. But how does one separate hype from reality? In part one of a two-part podcast, Richard Curran of Intel leads an expert panel discussion on the concept of confidential computing.nes mobile operating system, Bluetooth and GPS technologies to help us all get past the burgeoning health crisis.
May 29, 2020Apple and Google are partnering up to bring technology to bear on COVID-19 contact tracing efforts. The tech giants are laudably putting aside any competitive urgings to co-develop a solution that combines mobile operating system, Bluetooth and GPS technologies to help us all get past the burgeoning health crisis.
May 29, 2020“So assume someone who takes a busy public transport to a big office building for work, and for fun declares themselves infected,” says Kumar. “This will create lots of alerts. Unfortunately, you only need a handful of these trolls who can overwhelm the system with all the false positives.”
May 28, 2020Development and deployment of container-based software has become a popular movement in technology. Docker, and container technology in general, has redefined cloud computing and offers significant benefits to developers and companies, including efficiency, cost savings, consistency, reliability, and scalability for the entire DevOps processes.
May 27, 2020Fortanix is offerings legacy enterprise firms a less disruptive way to deliver reliable end-to-end security across hybrid environments. IDN looks at how Fortanix HSM Gateway integrates cloud apps and databases with legacy on-premises security.
May 27, 2020Big tech companies are adopting a new security model called confidential computing to protect data while it’s in use. A handful of major technology companies are going all in on a new security model they’re calling confidential computing in an effort to better protect data in all its forms.
May 21, 2020At this week’s Build virtual event, Microsoft announced new Identity and Azure features meant to improve security for both application developers and enterprise customers. For developers, admins, and end-users alike, new Identity capabilities to help foster a secure and trustworthy app ecosystem include Publisher Verification, app consent policies, and general availability of Microsoft authentication libraries (MSAL) for Angular.
May 19, 2020One of the most important things to do in a digital setup is to avoid any forms of blunders related to security. However, ensuring that an app developer doesn’t have direct control over the security of a system goes a long way in ensuring that an app is fully secure.
May 19, 2020The Fortanix Confidential Computing Enclave Manager™ empowers organizations dealing with sensitive and regulated data to ensure and enhance security while the data is in use.
May 18, 2020Fortanix today announced that a software-as-a-service (SaaS) platform for managing instances of confidential computing on the Microsoft Azure cloud is now generally available.
May 18, 2020With hackers becoming more successful by the day and organizations looking to protect themselves from becoming the next victim, they might consider the new Fortanix Confidential Computing Enclave Manager, a SaaS offering that enables applications to run in confidential computing environments, verifies the integrity of those environments, and manages the application lifecycle for secure enclaves running on Microsoft Azure confidential computing DCsv2-series VMs.
May 7, 2020One of the many issues that keeps CISOs up at night is the realization that no matter how robust and comprehensive their cybersecurity is, their IT systems are likely to be breached at some point.
May 4, 2020The deployment of Fortanix Data Security Platform on Azure will enhance data protection and drive seamless migration to the public cloud. The Runtime Encryption Company, Fortanix, announced that its Self-Defending Key Management Service™ (KMS) will now be running on Microsoft Azure.
May 4, 2020Fortanix, a Runtime Encryption company, announced the availability of the Fortanix Self-Defending Key Management Service running on Microsoft Azure to help customers protect private data in the public cloud.
Apr 30, 2020The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have nearly limitless compute and storage resources at our fingertips. One may think of this as the first wave of automation within the application development and deployment process.
Apr 27, 2020Microsoft today made available Azure confidential computing built on Intel hardware for enterprise cloud customers. It follows a similar IBM Cloud move last week.
Apr 24, 2020Integrating cloud applications and databases with legacy on-premises Hardware Security Modules (HSMs), Fortanix announced the availability of the Fortanix HSM Gateway™ solution to provide enhanced data security.
Apr 23, 2020Fortanix, the Runtime Encryption company, announced the availability of the Fortanix HSM Gateway, a new extension to the Fortanix Self-Defending Key Management Service.
Apr 22, 2020IBM today announced the general availability of IBM Cloud Data Shield, a service built to better protect business applications while information is at rest, in transit, and in use. The platform, developed in a partnership with Fortanix, relies on confidential computing, a technology gaining traction as more organizations seek new ways to secure their sensitive data in the cloud.
Apr 22, 2020The offer coincides with the new Fortanix HSM Gateway. Fortanix today announced the new Fortanix Legacy HSM Replacement program. The free trial program lets partners offer customers a migration path from their legacy hardware security modules (HSMs).
Apr 22, 2020IBM doubled down on confidential computing with Fortanix and said its Fortanix-powered IBM Cloud Data Shield now supports containerized applications IBM Cloud Kubernetes and RedHat OpenShift. This allows businesses to move and secure applications in the public cloud by running them in a secure enclave on Intel Software Guard Extension (SGX) hardware.
Apr 21, 2020In 2020, enterprises need to look to new encryption technologies paired with key management to protect sensitive data, particularly in cloud and multi-cloud environments. The current macro-economic climate fueled by the COVID-19 pandemic is forcing even more enterprises to move their sensitive workloads to public cloud.
Apr 17, 2020A major feature of the current COVID-19 crisis has been the sudden growth of state control and influence on everyday lives. Whilst most would agree measures such as nationwide lockdowns are a short-term necessity, it has highlighted how governments are able to give themselves potentially chilling new powers to wield at very short notice, aided by modern technology.
Apr 8, 2020The concept of the agile and remote worker has become more prevalent in recent years, as consumer Wi-Fi becomes more faster, we carry corporate laptops or BYOD-permitted smartphones, and realize we don’t all need access to a printer and fax machine.
Apr 2, 2020We live in a world where data is transmitted back and forth all the time. We also live in a world where people want to get access to that data wherever they can. Things like bank account numbers, credit card info, or confidential patient data are all highly valuable. We’ve worked hard to secure the data when it is being transmitted with protocols like SSL and TLS. Once those were in place, attackers started looking for data hiding in the storage media. Now we encrypt data wherever it rests. But that’s still not enough.
Mar 30, 2020In just a handful of years, the use of cloud computing has transitioned from being a leading-edge strategy to a standard business practice. The efficiency, agility and reduced overheads created by cloud-based services are swiftly becoming essential if an organisation is to remain profitable and competitive.
Mar 30, 2020Last week Infosecurity explored the immediate impact of COVID-19 on the cybersecurity industry, and what experts felt would be the short-term significance. David Greene, chief revenue officer at Fortanix, said that this will allow businesses to get the right cybersecurity systems and processes in place if they can, so “we can all be ready for what comes next.”
Mar 27, 2020The study, which was carried out in partnership with runtime encryption company, Fortanix, throws light on how encryption can significantly help organisations to mitigate risk, when it comes to falling foul of the CCPA which came into effect on the first day of 2020.
Mar 27, 2020As technology companies and the medical community work to find ways to track and test for the virus, privacy might fall by the wayside. In late January and early February, a study of influenza had the ability to reveal whether subjects in the Seattle area were infected by the novel coronavirus.
Mar 27, 2020Data security in the cloud has often been assumed, but now it needs to be assured. Dr Richard Searle, Senior Security Architect at Fortanix explains how to take back control. In a drive to streamline processes and improve cost efficiency, organisations are entrusting an ever-increasing amount of sensitive data to public cloud providers.
Mar 26, 2020The report highlights that encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA.
Mar 26, 2020Enterprise Strategy Group (ESG) – an IT analyst, research, validation and strategy firm – and Fortanix® Inc., the Runtime Encryption® company, today announced results of the ESG industry report focused on compliance guidelines for the California Consumer Privacy Act (CCPA).
Mar 26, 2020As we work remotely and isolate ourselves from friends and colleagues as best we can, the impacts of COVID-19 will continue to hit the technology sector in terms of output and innovation.
Mar 26, 2020Organizations collecting and maintaining personal information about California and New York residents should be paying attention to what is happening with the states’ consumer privacy laws.
Mar 26, 2020Encryption provides the best defense against any fines that might be levied for violations or data breaches under CCPA, according to ESG and Fortanix.
Mar 18, 2020Firms in retail, manufacturing, logistics and more are embracing cloud computing in one form or another but it’s in the financial services sector where deployment is proving a particularly complex matter. The use of multi-cloud infrastructures is also disproportionately higher, driven by a range of business and technology considerations. That creates a number of challenges – challenges that can only be solved in that most pervasive of environments: the hardware.
Mar 12, 2020Video recording of Fortanix CEO's interview with Digital Anarchist.
Mar 7, 2020When it comes to confidential computing, Microsoft, Intel, and Fortanix weren’t speaking in whispers at RSA Conference. The three companies are all founding members of the Confidential Computing Consortium. And in addition to hosting a panel about the topic at the annual security conference, company executives stressed the importance of confidential computing in their own security events, during interviews, and on the show floor at RSA.
Mar 6, 2020Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.
Mar 5, 2020Cyber threats now command the corporate sector’s full attention. It’s reached the point where some CEOs have even begun adjusting their personal online habits to help protect themselves, and by extension, the organizations they lead. Corporate consultancy PwC’s recent poll of 1,600 CEOs worldwide found that cyber attacks are now considered the top hinderance to corporate performance, followed by the shortage of skilled workers and the inability to keep up with rapid tech advances.
Mar 2, 2020Ambuj Kumar of Fortanix further put the matter into perspective, sharing that “infrastructure is far too complex to be secure. It includes so much software, from OS to driver to users to endpoints that inevitably something will be vulnerable.
Feb 27, 2020Anand Kashyap is the chief technology officer at Fortanix, a US-based cybersecurity firm. Founded in 2016, the startup specialises in encrypting data in use. While traditional encryption protects data at rest and data in motion, Fortanix’s RunTime Encryption platform allows applications to run using encrypted data, securing it while it is vulnerable to a variety of attacks.
Feb 24, 2020To bring oversight & control of security back into the business implement a centralised cloud strategy, encrypt sensitive data across all cloud providers themselves and manage it in one place.
Feb 24, 2020If putting unencrypted data up in a public cloud is like leaving your house unlocked, keeping encrypted data and the encryption keys in the same cloud could be akin to leaving a copy of your housekey under your doormat.
Feb 24, 2020Trusting the cloud involves a change in mindset. You must be ready to use runtime encryption in the cloud.
Feb 21, 2020Shadow digital minister Chi Onwurah challenges the government to stop Google’s plans to move UK user data out of the EU.
Feb 11, 2020Following the news regarding the US charging four Chinese military officers over the huge Equifax breach, Ambuj Kumar, CEO and co-founder of Fortanix commented below.
Feb 11, 2020The cloud is now a common storage realm for companies that want to scale their data while making use of usually large capacities. However, some of the newest cyber attacks around right now are increasingly targeting the cloud, particularly cloud applications. Jethro Beekman, technical director at Fortanix, said: “Cloud migration and the ineffectiveness of perimeter defences have led to an increase of host- and service-based security mechanisms.
Feb 11, 2020At least one security expert highlighted how some nation states have been conducting cyber warfare operations for a while now, rather than make use of conventional military operations. “Compared to conventional war, cyber warfare offers more precision. One can control exactly what and whom to target. Also, it’s much less expensive,” said Ambuj Kumar, CEO and co-founder of Fortanix.
Feb 10, 2020From Ambuj Kumar, CEO & Co-Founder, Fortanix: Compared to conventional war, cyber warfare offers more precision. One can control exactly what and whom to target. Also, it’s much less expensive. This is why we will see more and more instances of cyber battles in future.
Jan 24, 2020Three years ago, the NotPetya ransomware wreaked over $10 billion in damage. Crafted by the Russian military, the malware relied on a nearly decade-old code named Mimikatz. It highlighted an ongoing Windows flaw that could expose users’ passwords left as cleartext in system memory. Even today, any exploitable system that hosts multiple users stands ready to expose those passwords to hackers, who can then seize that data and use it to log into adjacent exploitable systems.
Jan 21, 2020Despite just being at the company for a short time, Faiyaz Shahpurwala, chief product officer at Fortanix, has been focused on delivering product and strategy. However, as a security expert, he took some time out to talk to us about his experience in the industry along with the announcement of a new form of security that could change so much in encryption.
Jan 17, 2020Microsoft has already issued a patch for the latest Windows vulnerability, which organizations should apply right away to avoid exposure to malware.
Jan 15, 2020Overnight, Microsoft announced a patch for a vulnerability discovered by the NSA in Windows 10. The vulnerability could have been exploited by hackers to create malicious software that looked legitimate.
Jan 10, 2020According to Gartner, 70% of businesses are adopting a hybrid cloud and multi-cloud strategy to augment their internal data centers. The challenges of protecting data and using encryption for multiple hybrid, public cloud, and on-premises environments increases complexity, cost, and security risk. Interview with Ambuj Kumar, Fortanix CEO for Security Weekly podcast.
Jan 8, 2020Secure enclaves can help reduce data breaches dramatically and support the value of the cloud securely.
Jan 6, 2020The California Consumer Privacy Act (CCPA) came into force on January 1st 2020 and requires impacted organizations to take various compliance measures to avoid potentially large fines. One of the key steps that organizations can take to manage the associated risks is to implement an holistic approach to encryption: as Anand Kashyap, CTO and co-founder at Fortanix explains.