Remove 2018 Remove Blog Remove Data collection Remove Digital transformation
article thumbnail

Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

Thales Cloud Protection & Licensing

This article was originally featured as a guest post on Venafi’s blog. If one cannot trust the machines, there is no point in collecting, running analytics, and executing decisions based on that data they collect. 2 – We need to be sure that data flows freely from application to application.

article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

On June 28, 2018 the governor of California Jerry Brown signed into law with Assembly Bill No. state to pass its own data privacy law. Last August, my colleague Ashvin Kamaraju wrote a blog shortly after this took place. 3) Fortunately, there is a lot of overlap in data security and privacy requirements.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

As both the public and private sector embrace digital transformation and face an increasingly sophisticated threat scape, presidential executive orders have sought to remedy that problem. I also encourage you to subscribe to our newsletter to receive the latest data security research, insight from our blogs and other resources.

IoT 98
article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

In the digital transformation era, companies across all sectors are using next-generation technologies to streamline their operations, deliver value to customers, and gain a competitive edge. Enormous quantities of data can be generated by and collected from a wide variety of IoT devices.