
Sign up to save your podcasts
Or


Kenneth White (@kennwhite, Security Principal @MongoDB) talks about the causes of internal breaches, querying encrypted data vs encryption-at-rest, and database evolutions.
SHOW: 644
CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw
CHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"
SHOW SPONSORS:
SHOW NOTES:
Topic 1 - Welcome to the show. You have quite a distinguished career in security and cryptography-adjacent. Tell us a little bit about your background, and what you focus on at MongoDB?
Topic 2 - Unfortunately, we’re hearing about more and more attacks that have an internal origination. From a security and cryptography perspective, what typically breaks down to allow this to happen?
Topic 3 - MongoDB has recently launched a database that enables querying encrypted data. Give us some background on how this new concept came into being.
Topic 4 - What are the technology components involved in making this happen - on the database side, on the application side, on the key management side?
Topic 5 - What are some of the application use-cases where this new database technology makes sense?
Topic 6 - How can people start exploring this technology? Is it available in both the software and SaaS offerings?
FEEDBACK?
By Massive Studios4.6
147147 ratings
Kenneth White (@kennwhite, Security Principal @MongoDB) talks about the causes of internal breaches, querying encrypted data vs encryption-at-rest, and database evolutions.
SHOW: 644
CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw
CHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"
SHOW SPONSORS:
SHOW NOTES:
Topic 1 - Welcome to the show. You have quite a distinguished career in security and cryptography-adjacent. Tell us a little bit about your background, and what you focus on at MongoDB?
Topic 2 - Unfortunately, we’re hearing about more and more attacks that have an internal origination. From a security and cryptography perspective, what typically breaks down to allow this to happen?
Topic 3 - MongoDB has recently launched a database that enables querying encrypted data. Give us some background on how this new concept came into being.
Topic 4 - What are the technology components involved in making this happen - on the database side, on the application side, on the key management side?
Topic 5 - What are some of the application use-cases where this new database technology makes sense?
Topic 6 - How can people start exploring this technology? Is it available in both the software and SaaS offerings?
FEEDBACK?

289 Listeners

1,093 Listeners

623 Listeners

583 Listeners

288 Listeners

302 Listeners

334 Listeners

961 Listeners

203 Listeners

205 Listeners

141 Listeners

500 Listeners

228 Listeners

36 Listeners

71 Listeners