A New Approach to Privacy-Preserving Encryption
GUEST BLOG For years, I’d always assumed that privacy-preserving encryption was equivalent to homomorphic encryption. You will recall that with homomorphic encryption, arithmetic can be done on encrypted
OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch
OpenSearch Partner Highlight: BYOK for B2B SaaS Operators using OpenSearch We recently learnt that a number of our prospects were running their B2B SaaS platform
Cybersecurity: Trends, Concerns, and Threats
Cybersecurity Trends 1. Cyber today needs to marry three major movements: First, the large-scale adoption of big data. There is so much data and it
Assumed Breach posture: how does encryption of data-in-use help?
Assumed Breach posture: how does encryption of data-in-use help? When unauthorized individuals extract restricted and sensitive information from protected systems, the event is known as
Why should you watch out for SOC Data: The Threat of Ransomware
SOC Security: why should you watch out for SOC Data – The Threat of Ransomware With the use of data-driven insights to efficiently develop business
OpenSearch Partner Highlight: How Portal26 Plugin can further secure…
OpenSearch Security: How Portal26 Plugin can further secure your OpenSearch Deployment Over the past few years there have been numerous security breaches reported in the news. These