FedScoop: Agencies seeking to protect their data in motion or at rest often use different encryption strategies, many of which are managed by application owners and database administrators across the organization.
However, data experts warn that agencies that lack a centralized encryption key management system, or a clearly defined strategy, open themselves up to the risk of losing control of encryption keys, allowing access to those who shouldn’t have it or expending resources to encrypt data that is not pivotal to the core mission.
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Nowi360Gov is an intelligent network of websites and e-newsletters that provides government business, policy and technology leaders with a single destination for the most important news and analysis regarding their agency strategies and initiatives.
Telephone: 202.760.2280
Toll Free: 855.i360.Gov
Fax: 202.697.5045
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Now