Remove Architecture Remove Authentication Remove Encryption Remove Webinar
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

The same rings true for encryption and authentication. Asymmetric encryption may require too much processing power for certain devices, making symmetric keys the only option. Many IoT products in the market today will outlive the validity of cryptographic algorithms they use to protect devices and encrypt sensitive data.

IoT 78
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use. For more information on this topic, please visit Venafi.

IoT 86
article thumbnail

How You Can Effectively Manage Your SSH Keys Towards Zero Trust Security

Security Boulevard

It is the de-facto standard for remote administration of servers, with SSH keys acting as identities to enable automated authentication, encryption, and authorization. Each identity, whether a human identity or a machine identity, needs to be authenticated and validated beyond any doubt before being granted access. UTM Medium.

Risk 52
article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

The Rise of Harvest Now, Decrypt Later Attacks A large, emerging concern are "Harvest Now, Decrypt Later" (HNDL) attacks, where hackers intercept and store encrypted long-life data with the intention of decrypting it once quantum computers become capable of breaking current encryption standards.

Risk 87
article thumbnail

Azure AD and Thales support for CBA authentication reflects the growing value of high assurance MFA

Thales Cloud Protection & Licensing

Azure AD and Thales support for CBA authentication reflects the growing value of high assurance MFA. The EDR initiative relies on Multi-factor Authentication (MFA) as a critical component to protect against cyber threats such as ransomware. Now, Azure AD users can authenticate using X.509 Thu, 03/31/2022 - 12:55.

article thumbnail

Turning Aspiration into Action to Protect Financial Institutions

Thales Cloud Protection & Licensing

Security professionals know adequate security requires encryption, tokenization, authentication, and access management, so why are their good intentions too often sidelined? Encryption Key Custodianship. The study found that encryption rates for U.S The barriers are very real, but not insurmountable. 12 at 2:00 p.m.