Data Engineering Podcast cover image

Protecting Your Data In Use At Enveil with Ellison Anne Williams - Episode 45

Data Engineering Podcast

00:00

Using Invail to Protect Data?

The primary attack vector right now for people who are trying to intercept data in a system is to wait for to be decrypted in memory. So by virtue of not having to do that when using in veil, it eliminates that particular vectors. I'm wondering, what are some of the remaining ways that people should be looking out for data compromise when they are using invail? Yepso a multitude of attack factors available for the usage of data and for really compromising data when it's being used or processed. The vulnerability really lies in the processing lay or in the memory component of the environment in which it's being processed.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app