![]() |
4 years ago | |
---|---|---|
README.inc | 6 years ago | |
assets | 6 years ago | |
docs | 5 years ago | |
examples | 6 years ago | |
slides | 4 years ago | |
.gitignore | 6 years ago | |
LICENSE.md | 6 years ago | |
Neuhalfen_Content-Encryption.pdf | 5 years ago | |
README.md | 5 years ago |
README.md
Sleep Better With Content Encryption
Content encryption can secure data even when the database has left the company. Effective content encryption not only makes attackers life harder, it also provides sound sleep for management, OPs, and everybody else responsible for data.
But there is another, equally important side: Microservices, Big Data, Machine Learning — these are the buzzwords that make a developers eye gleam.
In reality these are often replaced by Integrating legacy systems, file based data exchange via ftp, and laws & compliance.
Content encryption and other cryptographic measures can help bring together technology and the ugly side of business. Though they are not for the careless to implement. This slide deck will give you a very short introduction into the why and how of implementing cryptography into your applications.
You might even push snooze on your alarm clock when the next Heartbleed hits the news.
Where
- 18. Gulaschprogrammiernacht (CCC Karlsruhe) (recording)
- German Perl Workshop 2018
- FrosCon 2017 recording
- Java User Group Cologne 2017
Slides
Here are some example slides. The whole presentation (Keynote) can be found here. A pdf export is also available. You can view the slides in your browser.