article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

The twin drivers of the problem are increased threats and the drive to digitally transform how organizations deliver value and revenue. The answer is probably twofold: The rate at which digital transformation is driving change. Digital transformation drives massive change. Big Data – 99%. Blockchain – 92%.

article thumbnail

European Businesses Signal ‘Growing Security Gap’ Amid Mass Digital Transformation

Thales Cloud Protection & Licensing

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business. Upwards of 84% of enterprises are using, or planning to use, digitally transformative technologies such as cloud, big data, containers, blockchain and the Internet of Things (IoT).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European businesses signal ‘growing security gap’ amid mass digital transformation

Thales Cloud Protection & Licensing

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business. Upwards of 84% of enterprises are using, or planning to use, digitally transformative technologies such as cloud, big data, containers, blockchain and the Internet of Things (IoT).

article thumbnail

MY TAKE: How ‘credential stuffing’ and ‘account takeovers’ are leveraging Big Data, automation

The Last Watchdog

A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet. Using this technique, the criminal collects your leaked credentials (usually stolen in a data breach) and then applies them to a host of other accounts, hoping they unlock more. Hackers count on it.

Big data 164
article thumbnail

NIST Cybersecurity Framework: IoT and PKI Security

Thales Cloud Protection & Licensing

As both the public and private sector embrace digital transformation and face an increasingly sophisticated threat scape, presidential executive orders have sought to remedy that problem. Put simply, trust is critical to the IoT. There are really four categories of threats introduced into organizations with IoT use.

IoT 97
article thumbnail

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The Last Watchdog

In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated to controlling the operations of a IoT-enabled services of all types, including smart buildings, IoT-enabled healthcare services and driverless cars. Related: Why the golden age of cyber espionage is upon us.

IoT 174
article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

Doing authentication well is vital for any company in the throes of digital transformation. Digital commerce would fly apart if businesses could not reliably affirm the identities of all humans and all machines, that is, computing instances, that are constantly connecting to each other across the Internet.