Redundancy Encryption

Download this episode

Download Video


We encrypted the Web traffic. And then decrypted it across the firewalls. We encrypted the files. And then decrypted them to load databases. We encrypted the disks. Wait. But we decrypted on boot. And this is why we need redundant encryption controls.



Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.