Remove Authentication Remove Blog Remove Digital transformation Remove Encryption
article thumbnail

RSAC 2019 Blog Series: Taking the Risk out of Digital Transformation: RSAC 2019’s Quest for Delivering “Better”

Thales Cloud Protection & Licensing

However, in an attempt to be “better” many organizations have leaned heavily on emerging technologies such as cloud, blockchain and IoT – aka digital transformation. However, as digital transformation proves “better” for many aspects, it isn’t proving to be better for security. Reducing Risk and Beating the Hackers.

article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

This year the report focuses on the post digital transformation era. In previous years, we have discussed the efforts of businesses to digitally transform their processes to maintain or gain a competitive advantage and many of these transformative technologies involves moving to the cloud.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Playbook: Effective User-Centric Authentication is Critical for Modern Business

Herjavec Group

Over the past three decades, businesses around the world have been undergoing a rapid digital transformation. From third-party suppliers to contractors and customers, many of these external users require authentication and authorization within your enterprise network. Outdated Systems.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1. are discovered.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use. How safely are you managing machine identities for IoT devices?

IoT 85
article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

This underpins the digital transformation imperative most of them face today, and the huge responsibility that rests on the shoulders of the CIO. The vast majority (84%) of enterprises are now using, or planning to use, digitally transformative technologies – such as big data, containers, blockchain and the Internet of Things (IoT).

article thumbnail

Cybersecurity is a Successfully Failure

Security Boulevard

Yes, we even have email encryption of all outbound messages with complete data loss prevention enabled with multi-factor authentication! Acquiring companies, hiring contractors, leveraging open source to save money (we will save that for another blog), and, my favorite, always doing business with the same VARs.