This past year, the deluge of breach notifications has approached an overwhelming level. The security breaches of 2013 included Adobe, Target, LivingSocial, Evernote, and Neiman Marcus, to name a few of the more high-profile examples. Similar security breaches, where hackers accessed personal identifiable information (PII)...

"In Encryption-in-Use: Challenges and Realities, I discussed why encryption-in-use as a security technology is critical to meeting the governance requirements for cloud data ownership and control. I also wrote about the technical challenges, and the need to engineer a delicate balance of the customer’s requirements...