article thumbnail

RSAC 2019 Blog Series: Taking the Risk out of Digital Transformation: RSAC 2019’s Quest for Delivering “Better”

Thales Cloud Protection & Licensing

However, in an attempt to be “better” many organizations have leaned heavily on emerging technologies such as cloud, blockchain and IoT – aka digital transformation. However, as digital transformation proves “better” for many aspects, it isn’t proving to be better for security.

article thumbnail

Recapping RSAC 2021: Cisco’s Keynote, Zero Trust Deployment & Passwordless Authentication

Cisco Security

One key security trend that has enabled this rapid digital transformation for organizations is a zero trust architecture. Zero Trust architecture falls apart without strong authentication to verify user identities. Zero Trust architecture falls apart without strong authentication to verify user identities. In Conclusion.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

This year the report focuses on the post digital transformation era. In previous years, we have discussed the efforts of businesses to digitally transform their processes to maintain or gain a competitive advantage and many of these transformative technologies involves moving to the cloud.

article thumbnail

Why You Need a Root of Trust to be an eIDAS Trust Service Provider

Security Boulevard

We have come a long way in the digital transformation journey. In little over a decade, identification and authentication solutions, The post Why You Need a Root of Trust to be an eIDAS Trust Service Provider appeared first on Entrust Blog.

article thumbnail

A Modern Approach to Authentication for Modern Times – Simple, Accurate & Frictionless

Security Boulevard

million in 2019 – organizations are realizing that yesterday’s user authentication tools no longer suffice. And because organizations face these fraud challenges while pursuing digital transformations, it’s increasingly clear that their …. With the US Federal Trade Commission (FTC) revealing that it received 3.6

article thumbnail

GUEST ESSAY: Five stages to attain API security — and mitigate attack surface exposures

The Last Watchdog

APIs (Application Programming Interfaces) play a critical role in digital transformation by enabling communication and data exchange between different systems and applications. So, how can you ensure your API security is effective and enable your digital transformation?

article thumbnail

Cyber Playbook: Effective User-Centric Authentication is Critical for Modern Business

Herjavec Group

Over the past three decades, businesses around the world have been undergoing a rapid digital transformation. From third-party suppliers to contractors and customers, many of these external users require authentication and authorization within your enterprise network. Outdated Systems.