by Luther Martin - Solution Architect, Voltage Security - Thursday, 29 January 2009.
This is quite a bit different from the way things are done today. Database encryption, for example, stops protecting data when it leaves the database, leaving it vulnerable to eavesdropping by hackers. The data-centric model, on the other hand, doesn't leave gaps like this. It always protects data, no matter where it goes. When it does this, it provides the best way to defeat the determined and well-funded cyber-criminals like those that compromised Heartland. It may even turn out to be the only way to defend against them.