How do we provide a level of data control that is compliant with GDPR? Enter Encryption and key management. Ultimately, with encryption, only key holders…
A deeper dive into GDPR: Data Control
Posted on 23 August 2017 by Alex Hanway in Enterprise Security
How much control do CIOs have over confidential information shared…
Posted on 28 June 2012 by Gemalto in Enterprise Security
Following on from our recent post on who is responsible for the security function, here is the second in our series of posts revealing the…
From Twitter
Loading...
More from Twitter
Latest comments