Kenneth White (@kennwhite, Security Principal @MongoDB) talks about the causes of internal breaches, querying encrypted data vs encryption-at-rest, and database evolutions.
SHOW: 644
CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotw
CHECK OUT OUR NEW PODCAST - "CLOUDCAST BASICS"
SHOW SPONSORS:
SHOW NOTES:
Topic 1 - Welcome to the show. You have quite a distinguished career in security and cryptography-adjacent. Tell us a little bit about your background, and what you focus on at MongoDB?
Topic 2 - Unfortunately, we’re hearing about more and more attacks that have an internal origination. From a security and cryptography perspective, what typically breaks down to allow this to happen?
Topic 3 - MongoDB has recently launched a database that enables querying encrypted data. Give us some background on how this new concept came into being.
Topic 4 - What are the technology components involved in making this happen - on the database side, on the application side, on the key management side?
Topic 5 - What are some of the application use-cases where this new database technology makes sense?
Topic 6 - How can people start exploring this technology? Is it available in both the software and SaaS offerings?
FEEDBACK?