article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Use cases of secure IoT deployment. In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. Tue, 06/01/2021 - 06:55. Use case 1: Fortune 500 Healthcare Company.

IoT 71
article thumbnail

IoT and Quantum Computing’s Impact on the Federal Government

Thales Cloud Protection & Licensing

Although one presentation was on IoT and the other was on quantum computing, they both had the same undertone and messaging. The Continued Impact of IoT. With IoT, this increases the attack vector exponentially. We need to turn to vendors such as Thales who can assist with cloud migrations from a security vantage point.

IoT 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Changing Face of Data Security in Federal Government

Thales Cloud Protection & Licensing

With details from our report, I also highlighted how demand for modernization, mobile payments, IoT, cloud migration and cost savings is driving the push for new technologies while increasing opportunities for threats. They have to enforce these controls that are defined by them by encrypting the data.”.

article thumbnail

What is Digital Sovereignty and Why is it Important in a Cloud Environment?

Thales Cloud Protection & Licensing

Last week, I had the opportunity to attend the Google Cloud Security Summit digital event and share how Thales and Google are working together to accelerate cloud migration safely and efficiently. There are many factors driving the need for customers to move their data to the cloud and explosive data growth is one those factors.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. IT modernization and cloud migrations of legacy systems are already putting our infrastructures and application stacks in a much stronger security posture. are discovered.

article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

Also with the increase in cloud, mobile, and IoT devices, a whole new generation of attack surfaces are vulnerable to hackers. Today, the vast majority of enterprises (94%) are using sensitive data in cloud, big data, IoT or mobile environments. Encryption has now become the leading solution for protecting sensitive data.

article thumbnail

The Difference Between Human and Machine Identities

Security Affairs

The shift from on-premises data centers to cloud-based applications and workloads has created an explosion in the number of machines being deployed on enterprise networks. For example, threat actors frequently hide attacks in encrypted traffic. Each of these machines requires an identity that must be managed throughout its lifecycle.