Kenneth White (@kennwhite, Security Principal @MongoDB) talks about the causes of internal breaches, querying encrypted data vs encryption-at-rest, and database evolutions.
SHOW: 644
**CLOUD NEWS OF THE WEEK - **http://bit.ly/cloudcast-cnotw)
**CHECK OUT OUR NEW PODCAST - **"CLOUDCAST BASICS")
SHOW SPONSORS:
SHOW NOTES:
**Topic 1 - **Welcome to the show. You have quite a distinguished career in security and cryptography-adjacent. Tell us a little bit about your background, and what you focus on at MongoDB?
**Topic 2 - **Unfortunately, we’re hearing about more and more attacks that have an internal origination. From a security and cryptography perspective, what typically breaks down to allow this to happen?
Topic 3 -** **MongoDB has recently launched a database that enables querying encrypted data. Give us some background on how this new concept came into being.
**Topic 4 **- What are the technology components involved in making this happen - on the database side, on the application side, on the key management side?
Topic 5 - What are some of the application use-cases where this new database technology makes sense?
**Topic 6 **- How can people start exploring this technology? Is it available in both the software and SaaS offerings?
FEEDBACK?