We're building a new database server to replace an old system. The rules say that the database must be encrypted and we've done so, historically, with a product that encrpyted the whole database.
In the previous blog post, “Embedded Security Using Cryptography”, we looked at how cryptography can be used for securing assets in embedded systems and ensure confidentiality, integrity and ...