Codes lock data away in a virtual warehouse; however, is encryption insufficient or a little more than required? Several information technology managers find code vulnerabilities to be widening through shared hardware and loopholes revealing lapses ...