Remove Architecture Remove Big data Remove Encryption Remove IoT
article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

IoT Security: Examine the vulnerabilities and challenges associated with securing the Internet of Things (IoT) devices and networks. Explore topics such as authentication protocols, encryption mechanisms, and anomaly detection techniques to enhance the security and privacy of IoT ecosystems.

article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

However, simple actions like adopting multi-factor authentication (MFA) or encrypting sensitive data everywhere should be exercised throughout the year and not just during that month. For example, 37% of the Thales survey respondents are not confident they know where their sensitive data is stored. And only a mere 2.6%

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Indeed, APIs have opened new horizons of cloud services, mobile computing and IoT infrastructure, with much more to come. This summer Gartner designated API security as a stand-alone pillar in its security reference architecture, not just an add-on component to other systems. Indeed, API security has become a red-hot topic.

Big data 240
article thumbnail

Advancing Trust in a Digital World

Thales Cloud Protection & Licensing

As new technologies, like artificial intelligence, cloud computing, blockchain, and the Internet of Things (IoT), become increasingly prominent in the workplace, digital trust practitioners will need to adapt responsibly and safely. Identify: An organization must be able to discover data wherever it resides and classify it.

article thumbnail

Retail has a multi-cloud problem…with sensitive data

Thales Cloud Protection & Licensing

DX technologies such as cloud, mobile payments, IoT, Big Data and others have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also in how they communicate with, serve, and support them. Encryption technologies are the top tools needed.

Retail 54
article thumbnail

Fintech Cybersecurity Trends in 2021

Security Boulevard

Because an AI can better analyze massive amounts of data to catch unauthorized usage faster, these tools can help secure fintech as 5G connectivity comes to the Internet of Things (IoT). . SASE network architecture, like multi-cloud storage, brings multiple systems together to link security solutions for the greatest effect.

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

TS: Yes, you can put something into everything, but all of a sudden you have this massive big data collection problem on the back end where you as the attacker have created a different kind of analysis problem. Of course, some nations have more capability than others to sift through huge amounts of data they’re collecting.