Digital Transformation.
Powered by Security.
Don't have an account yet? Register now to make sure you don't miss any news and to access exclusive content for professionals.
In an assessment of "Microsoft online services", a working group of the Data Protection Conference (AG DSK) concludes (PDF) that the encryption of processed data is regularly not possible, for example when data is displayed in the browser...
If you use several cloud services connected in a sequence of a business process, we speak of multi-cloud usage. The chances are high that the same data and cloud services are used in several of your company's business processes.
In the fourth part of our series on data residency, we look at the various encryption techniques and examine their advantages and disadvantages. Messages and information have been encrypted since ancient times. The modern era...
Part 3 of our series on data residency takes up the issues from the previous parts 1 and 2 and addresses the situations in which encryption improves information protection. There are only limited ways to protect data appropriately.
This is part 2 of our series on data residency. Read part 1 about data residency: Are local data centers really secure? An important topic that should not be ignored: data residency, also referred to as "data localization" or...