Remove 2018 Remove Blog Remove Encryption Remove Technology
article thumbnail

Established and emerging technologies to watch out for in 2018

Thales Cloud Protection & Licensing

As 2017 draws to a close, the trends and innovations that will shape the technology industry over the coming weeks, months and years were brought into sharper focus over the course of the last twelve months. Looking to the new year however, which trends will come to define our industry in 2018 and beyond? Shift towards micro-services.

article thumbnail

2018 Global Data Regulations & Compliance Heat Up – Are you Ready?

Thales Cloud Protection & Licensing

This year, the major regulation that will be implemented, is the European Union’s General Data Protection Regulation (GDPR) , which takes effect on May 25, 2018. This is designed to promote the protection of customer information as well as the information technology systems of regulated entities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

This morning we announced, in tandem with our partner 451 Research, the Global Edition of the 2018 Thales Data Threat Report. Adoption levels are high across the board for these technologies. For each technology area, encryption or encryption-related technologies were the requirement. Encrypt the data.

article thumbnail

10 Personal Finance Lessons for Technology Professionals

Troy Hunt

This is part of the opening monologue of the Ozark series and when I first heard it, I immediately stopped the show and dropped it into this blog post. pic.twitter.com/4NK5GAm1z2 — Troy Hunt (@troyhunt) December 24, 2018. So here it is - 10 Personal Financial Lessons for Technology Professionals. Of my wife's choices.

article thumbnail

Meta Digs in Heels on Encryption

Security Boulevard

Meta Digs in Heels on Encryption. Government Encryption Fight. The fight for encryption can be summarized by the arguments of two sides: government and business. Both agree that encryption is useful - the question at hand is, what is the cost of using encryption? brooke.crothers. Fri, 04/15/2022 - 17:15.

article thumbnail

Ryuk Ransomware: Origins, Operation Mode, Mitigation

Heimadal Security

Widely known for targeting governments, academia, healthcare, manufacturing, and technology organizations’ cybersystems, Ryuk is a ransomware-as-a-service (RaaS) group that’s been active since August 2018. The post Ryuk Ransomware: Origins, Operation Mode, Mitigation appeared first on Heimdal Security Blog.

article thumbnail

2018 Predictions – Rise of IoT adoption will increase cybersecurity attacks

Thales Cloud Protection & Licensing

With 2018 approaching, I have been thinking about what will happen in the cybersecurity landscape and would like to make some predictions for the year ahead. For a technical perspective and prediction, our VP of Technical Strategy, Sol Cates sees a significant shift towards micro-services in the technology space.

IoT 89