When Certes dropped their announcement last week, it got me thinking about a gap that most data protection and cyber resilience teams haven’t fully reckoned with yet — and it’s not the one you’re probably thinking of.
Server-to-server data flows are largely unprotected in most environments; and sophisticated adversaries are already harvesting that traffic today with the intention of decrypting it later. Your backup strategy doesn’t address that. Your DR plan doesn’t either.
So who owns that problem — and have your teams even asked the question yet?
(more…)



You must be logged in to post a comment.