Featured

Data Con LA 2021 - Trust No One



Published
Eysha Shirrine Powers, IBM, STSM, Chief Architect, IBM Z Cryptographic Portfolio
With traditional encryption, sensitive data is encrypted, stored or transmitted, then decrypted for use. The data remains protected while it is encrypted but loses that protection when it's in use. What if you could encrypt data and yet still use the data while it is encrypted? Welcome to fully homomorphic encryption!
Category
Management
Be the first to comment