article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

This morning we announced, in tandem with our partner 451 Research, the Global Edition of the 2018 Thales Data Threat Report. It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. Big Data – 99%.

article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

In this age of big data, the concept is fitting, because this kind of information is increasingly being used to identify individuals and even machines. In the following, I focus on the analytics component, how it is increasingly used across enterprises, and why it is important to protect big data. Big Data Analytics.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Highlights from DefCon 2018

Thales Cloud Protection & Licensing

We attended the show with our colleague Paul Cleary and sat in on many talks (and demos) ranging from attacking IoT devices over insecure Bluetooth connections, to exploiting publically available expired certificates. Our favorite presentation was a talk called “Reaping and Breaking Keys at Scale: When Crypto Meets Big Data.”

article thumbnail

Gulf countries came under hackers’ spotlight in 2018, with more than 130 000 payment cards compromised

Security Affairs

Bahrain, 08.04.2019 – Group-IB, an international company that specializes in preventing cyberattacks , and NGN International, a global system integrator, analyzed cybersecurity landscape in Gulf countries in 2018. According to Group-IB’s annual Hi-Tech Crime Trends 2018 report, on average, from June 2017 to August 2018, the details of 1.8

article thumbnail

The Essential Guide to Radio Frequency Penetration Testing

Pen Test

Its primary goal is to meticulously identify vulnerabilities inherent within wireless communication systems (Smith & Johnson, 2018). In contemporary times, with the exponential growth of the Internet of Things (IoT), smart homes, connected cars, and wearable devices, the importance of RF pentesting has soared significantly.

article thumbnail

Cloud Backup and Recovery: What to Expect in 2018

Spinone

Many IT specialists are predicting that 2018 will be “the year of the cloud”, as companies increasingly have to deal with the backup needs of massive amounts of data, connect more and more devices to the Internet of Things , and start to appreciate the benefits that a cloud-based IT strategy can offer.

Backups 40
article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

Data breaches are the new normal. According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Also with the increase in cloud, mobile, and IoT devices, a whole new generation of attack surfaces are vulnerable to hackers.