Ownership of keys differentiates CMK from other similar security architectures, allowing companies to comply with data privacy regulations. | Continue reading
Now is the time for cloud apps to build their privacy reputation | Continue reading
And it won. Again. | Continue reading
Re-identification is trivial by joining other data sets | Continue reading
You can’t compare the privacy of SaaS offerings until you understand their trust model. | Continue reading
The relationship between data privacy and net negative churn | Continue reading