Remove 2018 Remove Encryption Remove Threat Reports
article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

2020 marks the launch of the Thales Data Threat Report-Global Edition for the seventh consecutive year. This year the report focuses on the post digital transformation era. The 2020 Thales Data Threat Report-Global Edition indicates that we have reached a tipping point. Sage advice: encrypt everything.

article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

According to our 2018 Global Data Threat Report , 67% of enterprises have been breached, with that percentage rate growing every year. Encryption has now become the leading solution for protecting sensitive data. It is considered a best practice to separate your encryption keys from the data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Securing Containers for GDPR Compliance

Thales Cloud Protection & Licensing

Around the world, enterprises are anxious about May 25, 2018, the day enforcement begins for the European Union’s General Data Protection Regulation (GDPR). Nearly one-quarter (24%) of the respondents to the 2018 Thales Data Threat Report (DTR) survey 1 indicate they already are using containers in production.

article thumbnail

Leaky Buckets in a Multi-Cloud World

Thales Cloud Protection & Licensing

According to our Global Data Threat Report , 45 percent of respondents will store sensitive data in SaaS environments this year, including cloud storage. In doing this, though, they must ask themselves if they have the proper access controls, data management approaches, and encryption installed.

article thumbnail

Protecting Big Data, while Preserving Analytical Agility

Thales Cloud Protection & Licensing

As The 2018 Thales Global Data Threat Report notes, “The top Big Data security issue is that sensitive data can be anywhere – and therefore everywhere – a concern expressed by 34% of global and U.S. Moreover, encryption keys must be protected and managed in a trusted manner for security and compliance with regulations.

article thumbnail

The Long Run of Shade Ransomware

Security Affairs

It spreads Shade/ Treshold variants, one of the most dangerous threats in the cyber crime scenario, known since its massive infection into the Russian panorama back in 2015, its expansion has been tracked by several CSIRTs and CERTs all across the world. Shade encrypts all the user files using an AES encryption scheme.

article thumbnail

Protecting data for compliance and transformation

Thales Cloud Protection & Licensing

As a result, Gartner’s 2017 CIO Agenda Survey revealed that around 18 percent of a CIO’s budget is currently spent on supporting digital business operations; a figure expected to rise to 28 percent by 2018. It’s for this reason then, that most businesses are looking at encryption as a strategy.