{"id":22670,"date":"2022-07-26T15:00:11","date_gmt":"2022-07-26T15:00:11","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22670"},"modified":"2022-07-24T20:43:08","modified_gmt":"2022-07-24T20:43:08","slug":"exfiltration-data-in-use-encryption","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/","title":{"rendered":"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says"},"content":{"rendered":"\r\n<p>Even the most advanced and sophisticated security tools are failing to protect against <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> and data exfiltration, according to a new report from <a href=\"https:\/\/www.esecurityplanet.com\/networks\/encryption-guide\/\">data encryption<\/a> vendor Titaniam.<\/p>\r\n\r\n\r\n\r\n<p>The <a href=\"https:\/\/titaniam.io\/state-of-data-exfiltration-and-extortion-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">State of Data Exfiltration and Extortion<\/a> report says that despite heavy investments, more than half of organizations that experienced ransomware attacks ended up paying the ransom.<\/p>\r\n\r\n\r\n\r\n<p>The organizations affected had solid cybersecurity measures, but nonetheless experienced significant data security failures. Titaniam also highlighted the solutions that can help leaders respond to triple threat ransomware attack trends, data theft, and extortion.<\/p>\r\n\r\n\r\n\r\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-one-company-survived-ransomware\/\">How One Company Survived a Ransomware Attack Without Paying the Ransom<\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Exfiltration Attacks Surge<\/h2>\r\n\r\n\r\n\r\n<p>The Titaniam report surveyed 107 organizations across the U.S. from various industries. In the past five years, 70% of these organizations reported an attack, and 40% experienced a cyberattack in the past year.<\/p>\r\n\r\n\r\n\r\n<p>More than half\u201468%\u2014of those attacked had their data exfiltrated. Additionally, 60% of these were subsequently extorted.<\/p>\r\n\r\n\r\n\r\n<p>\u201cExfiltration rates are up 106% relative to 5 years ago,\u201d the study says.<\/p>\r\n\r\n\r\n\r\n<p>According to Titaniam, more than 75% of organizations surveyed had all three significant categories of ransomware protection:<\/p>\r\n\r\n\r\n\r\n<ul class=\"wp-block-list\">\r\n<li>78% had data security and safety measures<\/li>\r\n<li>75% had prevention and detection<\/li>\r\n<li>73% had backup and recovery systems<\/li>\r\n<\/ul>\r\n\r\n\r\n\r\n<p>However, 60% of those attacked were forced to give in to ransom demands.<\/p>\r\n\r\n\r\n\r\n<p>According to Titaniam, \u201ccyber criminals are no longer limiting themselves to just encrypting entire systems\u2014they are making sure to steal data ahead of the encryption so that they can have additional leverage on the victim.\u201d<\/p>\r\n\r\n\r\n\r\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">Best Backup Solutions for Ransomware Protection<\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Stolen Credentials Source of Attacks<\/h2>\r\n\r\n\r\n\r\n<p>Arti Arora Raman, founder and CEO of Titaniam, told <em>eSecurity Planet<\/em> that data exfiltration attacks are not typically executed by attackers hacking into networks but rather by attackers simply logging in using stolen credentials.<\/p>\r\n<figure id=\"attachment_22675\" aria-describedby=\"caption-attachment-22675\" style=\"width: 296px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-22675\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/07\/Arti-Arora-Raman-296x300.jpg\" alt=\"Arti Arora Raman\" width=\"296\" height=\"300\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/Arti-Arora-Raman-296x300.jpg 296w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/Arti-Arora-Raman-768x778.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/Arti-Arora-Raman-150x152.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/Arti-Arora-Raman-300x304.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/Arti-Arora-Raman-696x705.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/Arti-Arora-Raman.jpg 997w\" sizes=\"(max-width: 296px) 100vw, 296px\" \/><figcaption id=\"caption-attachment-22675\" class=\"wp-caption-text\">Titaniam CEO Arti Arora Raman<\/figcaption><\/figure>\r\n\r\n\r\n\r\n<p>\u201cIn this type of situation, all other data security controls simply fall away, giving unfettered data access to attackers,\u201d Raman said.<\/p>\r\n\r\n\r\n\r\n<p>The solution? Raman says the emerging technology of choice to defend against data exfiltration and extortion attacks is <em>encryption-in-use<\/em>.<\/p>\r\n\r\n\r\n\r\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/homomorphic-encryption-makes-real-world-gains\/\">Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft<\/a><\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Data Security and Encryption<\/h2>\r\n\r\n\r\n\r\n<p>Evidently, if over 70% of leaders assume they are using strong cybersecurity systems but more than half are extorted and end up paying a ransom, the need to take a deep look at how data protection is being approached is paramount, Raman said.<\/p>\r\n\r\n\r\n\r\n<p>\u201cWe must understand that while prevention, detection, and backup are essential, no ransomware defense strategy is complete without eliminating data exfiltration. This is what would take us beyond the notions of impenetrability and towards immunity,\u201d Raman said.<\/p>\r\n\r\n\r\n\r\n<p>While encrypting data at rest and data in motion is common practice, data in use is almost 100% unencrypted, according to Titaniam. Furthermore, data in use is increasingly targeted due to its vulnerability, potential to hold sensitive information, and the complexity of securing it.<\/p>\r\n\r\n\r\n\r\n<p>\u201cTitaniam extends strong data protection that has traditionally only been available for data at rest and in transit to also cover data in use,&#8221; Raman said.<\/p>\r\n\r\n\r\n\r\n<p>Titaniam is also NIST FIPS 140-2 certified, she added.<\/p>\r\n\r\n\r\n\r\n<p>Titanium also offers nine other data security and privacy formats, including traditional and format-preserving encryption, vaulted and vaultless tokenization, static and dynamic as well as whole or partial data masking, redaction, and hashing. This translates to the equivalent of four other data security solutions with the addition of innovative encryption-in-use, the company claims.<\/p>\r\n\r\n\r\n\r\n<p>Data-in-use often lives in cloud service back-ends, powering business and customer support, apps, AI, and security operations. Titanium says it has the cloud covered too, with interoperable modules that can be mixed and matched to support all varieties of cloud and hybrid architectures as well as a large variety of data platforms and applications.<\/p>\r\n\r\n\r\n\r\n<p>Regarding performance, Raman says that unlike other encryption-in-use and tokenization providers that operate with high query and storage overhead, Titaniam requires less than 5% query and search overhead.<\/p>\r\n\r\n\r\n\r\n<p>\u201cThis enables us to tackle large, high-performance, high-throughput datasets,\u201d the CEO added.<\/p>\r\n\r\n\r\n\r\n<p>Titaniam Vault, Titaniam Plugin, Titaniam Translation Service, Titaniam Proxy, and Titaniam Studio can stand alone or combine via the Platform, which provides bring your own key encryption (BYOK) and ensures that protected data can move across the enterprise.<\/p>\r\n\r\n\r\n\r\n<p>In the event of an attack, the company produces audit-ready certification that says sensitive data retained encryption. Software-as-a-service (SaaS) companies can store and process customer data with less risk, data-intensive products can operate with fewer privacy or compliance concerns, and governments can secure their data and intellectual property.<\/p>\r\n\r\n\r\n\r\n<p>\u201cThis means that customers can now have a dramatically superior alternative to tokenization where data can be protected but still utilized,\u201d Raman said.<\/p>\r\n\r\n\r\n\r\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-encryption-software\/#Homomorphic-encryption\">Best Encryption Software<\/a><\/p>\r\n\n\n<div id=\"ta-campaign-widget-66d6f4f8a2b06-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f4f8a2b06\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f4f8a2b06\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f4f8a2b06\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f4f8a2b06\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f4f8a2b06\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f4f8a2b06\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Even the most advanced and sophisticated security tools are failing to protect against ransomware and data exfiltration, according to a new report from data encryption vendor Titaniam. The State of Data Exfiltration and Extortion report says that despite heavy investments, more than half of organizations that experienced ransomware attacks ended up paying the ransom. The [&hellip;]<\/p>\n","protected":false},"author":293,"featured_media":22673,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[22,16],"tags":[5735,2369,860,3414,730,5277],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[383,31790],"class_list":["post-22670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-applications","category-trends","tag-application-security-2","tag-cloud-security","tag-encryption","tag-network-security","tag-security","tag-web-security","b2b_audience-awareness-and-consideration","b2b_product-encryption-data-loss-prevention","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"The best way to stop data from being stolen is by encrypting data in use, says a company that can do just that.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"The best way to stop data from being stolen is by encrypting data in use, says a company that can do just that.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-26T15:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-24T20:43:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ray Fernandez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ray Fernandez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/\"},\"author\":{\"name\":\"Ray Fernandez\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422\"},\"headline\":\"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says\",\"datePublished\":\"2022-07-26T15:00:11+00:00\",\"dateModified\":\"2022-07-24T20:43:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/\"},\"wordCount\":782,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg\",\"keywords\":[\"application security\",\"cloud security\",\"encryption\",\"network security\",\"security\",\"Web security\"],\"articleSection\":[\"Applications\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/\",\"name\":\"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg\",\"datePublished\":\"2022-07-26T15:00:11+00:00\",\"dateModified\":\"2022-07-24T20:43:08+00:00\",\"description\":\"The best way to stop data from being stolen is by encrypting data in use, says a company that can do just that.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg\",\"width\":1088,\"height\":725,\"caption\":\"encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422\",\"name\":\"Ray Fernandez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg\",\"caption\":\"Ray Fernandez\"},\"description\":\"Ray is a Content and Communication Specialist with more than 10 years of experience. He currently works as a Senior Copywriter for Wunderman Thompson and writes as a freelance technology journalist for several tech media. His work has been published in Microsoft, Slash Gear, Screen Rant, OOSKA News, Bloomberg, and Nature Conservancy, among other places.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/rfernandez\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says | eSecurity Planet","description":"The best way to stop data from being stolen is by encrypting data in use, says a company that can do just that.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says | eSecurity Planet","og_description":"The best way to stop data from being stolen is by encrypting data in use, says a company that can do just that.","og_url":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/","og_site_name":"eSecurity Planet","article_published_time":"2022-07-26T15:00:11+00:00","article_modified_time":"2022-07-24T20:43:08+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg","type":"image\/jpeg"}],"author":"Ray Fernandez","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Ray Fernandez","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/"},"author":{"name":"Ray Fernandez","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422"},"headline":"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says","datePublished":"2022-07-26T15:00:11+00:00","dateModified":"2022-07-24T20:43:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/"},"wordCount":782,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg","keywords":["application security","cloud security","encryption","network security","security","Web security"],"articleSection":["Applications","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/","url":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/","name":"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg","datePublished":"2022-07-26T15:00:11+00:00","dateModified":"2022-07-24T20:43:08+00:00","description":"The best way to stop data from being stolen is by encrypting data in use, says a company that can do just that.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/07\/encryption.jpeg","width":1088,"height":725,"caption":"encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/trends\/exfiltration-data-in-use-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Exfiltration Can Be Stopped With Data-in-Use Encryption, Company Says"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/811d855b75a75a5e65a0367075eec422","name":"Ray Fernandez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/06\/Ray.Fernandez-headshot-Ramiro-Fernandez-1-150x150.jpg","caption":"Ray Fernandez"},"description":"Ray is a Content and Communication Specialist with more than 10 years of experience. He currently works as a Senior Copywriter for Wunderman Thompson and writes as a freelance technology journalist for several tech media. His work has been published in Microsoft, Slash Gear, Screen Rant, OOSKA News, Bloomberg, and Nature Conservancy, among other places.","url":"https:\/\/www.esecurityplanet.com\/author\/rfernandez\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22670"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/293"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22670"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22670\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/22673"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22670"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22670"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22670"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}