Preview
Link Preview
Five encryption myths debunked for feds
HPE Chief Technologist Terence Spies sat down with Cyberscoop Radio at the HPE Protect event at National Harbor to discuss five myths that federal agencies have to deal with when it comes to encryption. Spies talks with Greg Otto on how format-preserving encryption can allow for agencies to conduct their work without systems slowing down or breaking altogether. Spies also highlights how encryption isnât enough on itâs own, needing to be formatted correctly in order to protect the sensitive data agencies regularly deal with. Perhaps most importantly is the notion that new forms of encryption can be added across a number of different enterprises, from systems looking to harness the cloud to those that still depend on legacy technology. Spies and HPE recognize the need for agencies to meet regulations and fulfill unfunded mandates â and inform IT shops on why they shouldnât be worried that their systems will break [âŠ]
HPE Chief Technologist Terence Spies sat down with Cyberscoop Radio at the HPE Protect event at National Harbor to discuss five myths that federal agencies have to deal with when it comes to encryption. Spies talks with Greg Otto on how format-preserving encryption can allow for agencies to conduct their work without systems slowing down or breaking altogether. Spies also highlights how encryption isnât enough on itâs own, needing to be formatted correctly in order to protect the sensitive data agencies regularly deal with. Perhaps most importantly is the notion that new forms of encryption can be added across a number of different enterprises, from systems looking to harness the cloud to those that still depend on legacy technology. Spies and HPE recognize the need for agencies to meet regulations and fulfill unfunded mandates â and inform IT shops on why they shouldnât be worried that their systems will break [âŠ]
Issue #1
This is an article and needs an Instant View page
- Accepted by admin
- Reporter's template handles this case better: https://instantview.telegram.org/contest/cyberscoop.com/template4/?url=https%3A%2F%2Fwww.cyberscoop.com%2Fradio%2Ffive-encryption-myths-debunked-feds%2F
- Type of issue
- IV not generated for target page
- Reported
- Jun 17, 2017