Cloud Security From the Ground Up, Part 2: Encrypting Data at Rest in the Cloud

In my last blog, I explained why building your compute infrastructure from the ground up on maintainable and supported operating systems is a highly recommended best practice. In this post, I explain why you should encrypt your data at rest in the cloud and include a number of best practices to consider.  Read more “Cloud Security From the Ground Up, Part 2: Encrypting Data at Rest in the Cloud”