article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

On June 28, 2018 the governor of California Jerry Brown signed into law with Assembly Bill No. state to pass its own data privacy law. For example, data collected by an entity may not be associated with an individual but could identify a household. The CCPA, which will come into effect on Jan. Looking into to the future.

article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

This skills deficit has been the top worry of IT pros for several years, according to tech consultancy ESG’s annual survey of IT pros; some 53% of the organizations participating in ESG’s 2018 -2019 poll reported a “problematic shortage” of cybersecurity skills. Digital transformation has only exacerbated this security skills gap.

Big data 159
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

Thales Cloud Protection & Licensing

If one cannot trust the machines, there is no point in collecting, running analytics, and executing decisions based on that data they collect. 2 – We need to be sure that data flows freely from application to application. To learn more visit Thales Booth 1222 and Venafi Booth 144 at Black Hat USA 2018 in Las Vegas.

article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

In the digital transformation era, companies across all sectors are using next-generation technologies to streamline their operations, deliver value to customers, and gain a competitive edge. Enormous quantities of data can be generated by and collected from a wide variety of IoT devices.

article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

As both the public and private sector embrace digital transformation and face an increasingly sophisticated threat scape, presidential executive orders have sought to remedy that problem. Cybersecurity is no different. But as the industry has evolved, this critical foundational concept has somehow taken a backseat.

IoT 97