article thumbnail

What it Takes to Achieve Saudi Arabia’s Vision 2030

Thales Cloud Protection & Licensing

What it Takes to Achieve Saudi Arabia’s Vision 2030. SAUDI ARABIA’S VISION 2030. Through Vision 2030, the Kingdom of Saudi Arabia (KSA) intends to reduce dependence on oil, diversify its economy, and develop public service sectors, such as health, education, infrastructure, recreation, and tourism. Encryption. Compliance.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

Addressing third-parties Allen founded The Santa Fe Group in 1995 and established it as a leading consultancy, specializing on emerging technologies. By 2030, 50 percent of employees are expected to be contract workers, Allen noted. And once you have that, then you have the ability to reverse algorithms and unlock encryption.

Risk 164
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

However, privacy and data security concerns are set to play a vital role as new vendors and technologies emerge to capitalize on 5G capabilities. MNOs must overcome their high-risk aversion around deploying immature technology and work to understand how they can best secure their networks now. Figure 1: PQC Migration.

Mobile 71
article thumbnail

Can smart cities be secured and trusted?

Thales Cloud Protection & Licensing

It is the year 2030, and you have had another busy day. With this seamless interaction of the latest IoT technologies, “smart cities” are redefining the way we live and work. There’s just one problem…these massive, radical, interconnected technology systems also raise serious privacy and security concerns.

article thumbnail

The Five-Step PCI DSS 4.0 Transition Checklist

CyberSecurity Insiders

They also predict this number will reach $408 billion in losses by 2030. Requirement 4: Less specificity on the type of encryption used means your organization is freer to follow industry best practices. The Nilson Report  estimated $28.6 billion in payment card-related losses occurred in 2020 (over one-third of them in the U.S.).

Antivirus 138
article thumbnail

Identity in Africa – an existential right for every citizen

CyberSecurity Insiders

In the case of ID4D, the Work Bank is looking to provide legal identity for all, notably birth registrations, by 2030. Self-enrolment services could take the form of users capturing their biometric data and photo via a secure mobile app, which then securely shares the identity data with a governmental agency using encryption.

Mobile 88
article thumbnail

Office 365 Backup Solutions: Security, Functionality & UI/UX

Spinone

In an interview with Petri , Steve Goodman, Microsoft MVP and Principal Technology Strategist with Content and Code, acknowledged the following: I think it’s [Office 365 – editorial note] been designed so it doesn’t need backups. It’s a set of rules and configurations applied to your data for it to remain unchanged.

Backups 40