Access and Feeds

Blog Archives

Confidential Computing: Keeping Data Secure During Computations

By Dick Weisinger

Security strategies for data and computing usually rely heavily on data encryption. This includes the encryption of data “at rest” and also during “transmission”. But a weak point of this strategy is the use of data during computation — data

Encryption, Security, and Open Source: Exposed Secrets Can Be Catastrophic

By Dick Weisinger

“The only method that currently exists for reliably protecting the world’s information is encryption,” wrote Edward Snowden for the Guardian. “The internet is more secure as a result.” Encryption is great! But encryption can also be a headache! Securing encryption

Security: The Odds are Against Avoiding a Cyber Breach

By Dick Weisinger

Gone are the days of tightly walled-in firewall protection using on-premise datacenters. Most businesses today have moved at least some of their operations to the cloud. And that means that most businesses find themselves under continual probes and attacks by

Cybersecurity Mesh: Scaling Security Controls Across Distributed Assets

By Dick Weisinger

Gartner has identified Cybersecurity Mesh as a top trend for security in 2022. The idea is that rather than enforce only one security perimeter around the complete IT environment, each device in the environment has its own security structure, complete

Entitlement Management: The Achilles Heel of Cloud Security

By Dick Weisinger

Entitlement Management is the mapping of identity with access privileges across a network. Privileges can include access to groups, applications, and any network resources. It is a way to identify who has access to what and what types of access