Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Generic User Avatar

Cloud Solution for Data


  • Please log in to reply
1 reply to this topic

#1 Malcomf

Malcomf

  •  Avatar image
  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:10 AM

Posted 26 July 2023 - 05:20 PM

What is best encryption method to use when working with third-party vendors that are providing cloud solutions around data? 



BC AdBot (Login to Remove)

 


#2 1PW

1PW

  •  Avatar image
  • Members
  • 460 posts
  • OFFLINE
  •  
  • Gender:Not Telling
  • Location:North of the 38th parallel.
  • Local time:09:10 PM

Posted 26 July 2023 - 08:09 PM


Depending upon the level of concern, military-grade encryption is quite safe.

Example: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

HTH

All viruses are malware but not all malware are viruses and if the malware doesn't self replicate it just isn't a virus. https://forums.malwarebytes.com/profile/17252-1pw/





1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users