Encryption & Key Management , Security Operations

How Encryption Provides Security for a New Digital Era

nCipher's John Grimm on How Encryption Is Changing With the Times
John Grimm, vice president of strategy and business development, nCipher Security

As digital transformation technologies such as containers and connected devices are changing business models, organizations are finding new ways to secure data with encryption. John Grimm of nCipher Security walks through how the use cases for encryption are keeping up with the times.

See Also: Live Discussion | Securing Business Growth: The Road to 24/7 Threat Detection and Response

In a video interview previewing an upcoming virtual executive roundtable with Information Security Media Group, Grimm discusses:

  • How organizations are currently using encryption, and what are new ways and best practices for expanding that use;
  • How encryption can better protect organizations from breaches and attacks;
  • How to reduce complexity when it comes to securing and protecting encryption keys.

Grimm is the vice president of strategy and business development at nCipher. He has more than 25 years of experience in information security, beginning as systems/firmware engineer building secure cryptographic key distribution systems. He has held leadership roles at companies in multiple areas of cybersecurity, including identity management, networking, PKI, cloud, encryption and key management.

To learn more about this upcoming roundtable, please visit the registration page.

About the Author

Scott Ferguson

Scott Ferguson

Managing Editor, GovInfoSecurity, ISMG

Ferguson is the managing editor for the GovInfoSecurity.com media website at Information Security Media Group. He's been covering the IT industry for more than 13 years. Before joining ISMG, Ferguson was editor-in-chief at eWEEK and director of audience development for InformationWeek. He's also written and edited for Light Reading, Security Now, Enterprise Cloud News, TU-Automotive, Dice Insights and DevOps.com.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.