According to a report by Intel in 2015, among companies experiencing data breaches, internal actors (employees, contractors, and third-party suppliers) were responsible for 43% of data loss, half [...]
If encryption is altogether a new concept for you, check out our last post on the basics of encryption. In this post, we will be branching out into a different category, known as file-level [...]
Access Control or Encryption? These two methods have been on long-standing with one another when it comes to having the upper hand in safeguarding data. But how can one decide which is better [...]
Generally, encryption implies converting data (plaintext) to an unreadable form by applying an algorithm and can only be reverted with a decryption key. At first glance, it seems that if one’s [...]
There are many functions in MyDiamo which is useful to users— one o f them being the masking function. It enables users to select how the encrypted data can be shown to whom without any [...]
On the previous post about “Types of Database Encryption Methods”, the types of database (DB) encryption methods were mentioned based on where the encryption took place. Different types can be [...]
What is HIPAA? Health Insurance Portability and Accountability Act (HIPAA) was enacted by the U.S. Congress in 1996. HIPAA specifies laws for the protection and use of Personal (or Protected) [...]