Remove 2021 Remove Cloud Migration Remove Encryption Remove Risk
article thumbnail

Anton’s Security Blog Quarterly Q1 2021

Security Boulevard

“The cloud trust paradox: To trust cloud computing more, you need the ability to trust it less” [GCP Blog]. The cloud trust paradox: 3 scenarios where keeping encryption keys off the cloud may be necessary” [GCP Blog]. Lost in translation: encryption, key management, and real security” [GCP Blog].

article thumbnail

Evolution of Cloud Security: From Shared Responsibility to Shared Fate

Thales Cloud Protection & Licensing

Evolution of Cloud Security: From Shared Responsibility to Shared Fate. Tue, 11/09/2021 - 11:20. Over the past year and a half, we have witnessed seismic changes with the accelerated adoption of the cloud and the shift to hybrid working. From shared responsibility to shared fate. This is called shared fate.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are You the Keymaster?

CyberSecurity Insiders

Fast-forward to the real world in 2021, and while we have not seen ghosts overrun our cities, what we have seen is a rapid proliferation of bad actors trying to besiege the defenses of virtual machines (VMs) that perform critical functions across modern computing infrastructures. Today’s environment. Importance of key management.

article thumbnail

Forrester and Accenture on Schrems II and the Security of International Data Flows

Thales Cloud Protection & Licensing

Thu, 05/27/2021 - 06:30. Business digitalization and cloud migration makes it even more difficult to maintain compliance with the rule, since organizations need to have clear visibility of data transfers, as well as of the laws applicable in the country hosting their data. Encryption. Encryption Key Management.

article thumbnail

We’ve moved to the cloud. Now, where on earth did I put those keys?

Thales Cloud Protection & Licensing

We’ve moved to the cloud. Thu, 06/17/2021 - 12:51. Key management in a cloud scenario: Me: I’m not sure where my keys are actually…. The move to the cloud or the transition to multiple clouds is likely the case for the vast majority of enterprise IT infrastructures. Learn how Guardium can ease cloud migration.

article thumbnail

Why Are We Still Separating Credential Management and Machine Identity Management?

Security Boulevard

The Thales Access Management Index 2021 report illustrates a highly fragmented landscape at the enterprise level. Coordinating that many systems can, at a minimum, create operational complexity, but it can also increase the risk of errors or misconfigurations creating security gaps. Protect cryptographic keys.

article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Tue, 06/01/2021 - 06:55. The data encryption public key and root of trust were installed in the pacemaker; the pacemaker then verifies the signed firmware against its root of trust. The pacemaker protected patient data with encryption and then the protected data could flow through Microsoft Azure, allowing for global data access reach.

IoT 71