GUEST BLOG: Five steps to take when securing your data with

GUEST BLOG: Five steps to take when securing your data with multi-factor authentication

Computer data exists in different states at different times: data in transit (information flowing through a network); data in use (active data that is being accessed and manipulated by a computer program); and data-at-rest, known as DAR, or data that is physically housed in a storage device like a solid-state drive. Many cybersecurity solutions focus on securing data in transit and data in use, but neglect securing DAR.

Related Keywords

Chris Kruell , Sun Microsystems , National Institute Of Standards , Hamline University , Us Department Of Defense Do , Data Security Group , National Information Assurance Partnership , Cornell University , Federal Information Processing Standards , National Institute , Common Criteria , Security Group , ,

© 2025 Vimarsana