Remove Architecture Remove Artificial Intelligence Remove Authentication Remove Big data
article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Explore topics such as authentication protocols, encryption mechanisms, and anomaly detection techniques to enhance the security and privacy of IoT ecosystems. Privacy and Data Protection: Explore techniques and frameworks for protecting personal information and ensuring compliance with privacy regulations.

article thumbnail

Advancing Trust in a Digital World

Thales Cloud Protection & Licensing

As new technologies, like artificial intelligence, cloud computing, blockchain, and the Internet of Things (IoT), become increasingly prominent in the workplace, digital trust practitioners will need to adapt responsibly and safely. Identify: An organization must be able to discover data wherever it resides and classify it.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

Nonetheless, cloud computing will continue to dominate digital transformation efforts, and many benefits will occur including enhanced data asset protection, fewer compliance failures, cyber resilience, and business productivity. Sustainability. More companies will be focused on sustainability. Automated technologies.

article thumbnail

How to Accelerate Government Transformation by Reducing Risk, Complexity, and Cost

Thales Cloud Protection & Licensing

From smart cities and digital IDs to open government and better governance, the Cloud, Big Data, IoT and Artificial Intelligence have enabled a wide range of digital government initiatives. Big transformation of big government. Data Security. Government. Cloud Security. More About This Author >.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

We each need to consider how these trends may affect our organizations and allocate our budgets and resources accordingly: AI will turbo-charge cybersecurity and cyberthreats: Artificial intelligence (AI) will boost both attackers and defenders while causing governance issues and learning pains. Bottom line: Prepare now based on risk.

article thumbnail

Why security pros should care about making zero trust frictionless

SC Magazine

Zero trust requires that all users, whether in or outside the organization’s network, are verified and authenticated continuously. This continuous validation, without implicit trust, ensures security configuration and posture before granting access to applications, workloads and data.? . High friction and high cost .