End-to-end encryption strategies
"In order for encryption to be used consistently, it has to be implemented by default and be as transparent as possible," says Stephen Roll, product manager at Iron Mountain, a data protection company. "For example, when we back up data over the Internet, the encryption is done prior to the transmission. It's protected while being transmitted and is already encrypted with 128-bit AES before it hits the storage media."
At CIO Today.
[ Read more ]