Remove 2018 Remove Data collection Remove Digital transformation Remove Technology
article thumbnail

Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

Thales Cloud Protection & Licensing

Thales eSecurity and Venafi are technology partners. This change has significantly expanded the data available to machines and the number of distributed actions they can affect. 1 – We need to be able to trust the data that comes from applications. This article was originally featured as a guest post on Venafi’s blog.

article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Security orchestration, automation and response, or SOAR, is a fledgling security technology stack that first entered the cybersecurity lexicon about six years ago. Digital transformation has only exacerbated this security skills gap.

Big data 159
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

On June 28, 2018 the governor of California Jerry Brown signed into law with Assembly Bill No. state to pass its own data privacy law. For example, data collected by an entity may not be associated with an individual but could identify a household. The CCPA, which will come into effect on Jan. Looking into to the future.

article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

In the digital transformation era, companies across all sectors are using next-generation technologies to streamline their operations, deliver value to customers, and gain a competitive edge. Enormous quantities of data can be generated by and collected from a wide variety of IoT devices.

article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

As both the public and private sector embrace digital transformation and face an increasingly sophisticated threat scape, presidential executive orders have sought to remedy that problem. However, making that vision a widespread reality requires organizations to be confident enough to adopt new connected technologies.

IoT 98