Remove Authentication Remove Big data Remove Encryption Remove Threat Reports
article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns.

article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

2020 marks the launch of the Thales Data Threat Report-Global Edition for the seventh consecutive year. This year the report focuses on the post digital transformation era. The 2020 Thales Data Threat Report-Global Edition indicates that we have reached a tipping point.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leopard Spots and Zebra Stripes: Big Data and Identity Management

Thales Cloud Protection & Licensing

In this age of big data, the concept is fitting, because this kind of information is increasingly being used to identify individuals and even machines. For years identity management has relied on three factors for authentication: What one knows (passwords). Big Data Analytics. What one has (tokens).

article thumbnail

The Future of Payments Security

Thales Cloud Protection & Licensing

Criminals use personal and financial data to impersonate customers and add apparent authenticity to a scam. Strong Customer Authentication (SCA). Table 1: Strong Customer Authentication Factors. These mechanisms should allow capturing of the following information: lists of compromised or stolen authentication elements.

Retail 143
article thumbnail

The Evolving Cybersecurity Threats to Critical National Infrastructure

Thales Cloud Protection & Licensing

However, simple actions like adopting multi-factor authentication (MFA) or encrypting sensitive data everywhere should be exercised throughout the year and not just during that month. The rising reliance on cloud platforms creates an expanded attack surface for threat actors and adversarial nation-states to exploit.

article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

This dual premise and promise is reflected in our Data Threat Report-Europe Edition – with over a third (36%) of enterprises stating they are now aggressively disrupting the markets they participate in through a digital transformation project or embedding digital capabilities that enable greater organisational agility.

article thumbnail

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

In an effort to meet compliance requirements – and with an eye towards cutting costs – the healthcare industry has turned its attention towards embracing digitally transformative technologies, including cloud, big data, Internet of Things and containers. respondents reported using these technologies with sensitive data.