The fact is, Nevada and Massachusetts are enacting legislation to require encryption of data on remote devices, and, frankly, there's no reason to think similar laws won't be passed in other states, even on a federal level. Many regulations and compliance frameworks have now embraced encryption as a requirement for data in motion and at rest.
To find out where the disconnect is coming from, and hopefully close the gap a bit, Michael A. Davis is working on an InformationWeek Analytics report that will explain how to use encryption technologies effectively from end to end. But first, we need your help with our comprehensive encryption survey covering the current state of encryption within the enterprise: What assets are, and are not, being encrypted to reduce the risk of exposure? Where sensitive data is going unencrypted, what's holding you back? Our survey also encompasses enterprise key management and database encryption.
This survey will take approximately 5 minutes to complete. Upon completion, you will be eligible to enter a drawing to receive one Apple 16GB iPod Touch, valued at $299, from TechWeb. Your responses will remain confidential and will be reported only in aggregate.
Thanks in advance.
Lorna Garey is executive editor of InformationWeek Analytics. She formerly was executive editor of Network Computing. Special to Dark Reading.