Government Agencies Decoding Encryption – How to Keep Cloud Data Private

The latest reports surrounding the surveillance programs of the NSA and their International counterparts reveal that these agencies have been able to decode the encryption methods some enterprises and organizations use to keep their online data private.
While these headlines are likely disconcerting for those operating in the U.S. or using software applications from cloud providers, as stated in our recent press release and blog post, enterprises do not need to allow their fears to slow down or stop their cloud adoption.
More attention has been turning to tokenization recently as a strong approach to secure sensitive data. Tokenization, like encryption, encodes or conceals data so it is protected from unauthorized parties. But unlike encryption, in which a mathematical link back to the original data’s true form still exists; tokenization is unique in that it completely removes the original data from the systems in which the replacement tokens reside (in this case, the cloud itself). You can find out more information about tokenization on this resource page.
When implemented in its strongest fashion (a randomized token generation approach

read more