There have been some great excuses for companies not to implement cohesive, encrypted, secure computing in their operations.rnEnd-to-end encryption? If s too complicated-and too much of a drag on computing resources. All that fiddling with public keys, private keys and lost keys is just too much of a hassle. And, of course, the bean counters would rather pay for the occasional break-in than the cost of installing new locks.
展开▼