Remove Authentication Remove Consumer Protection Remove Data privacy Remove Technology
article thumbnail

Data Privacy Week 2023: Privacy Gains Power From Other Societal Forces

Security Boulevard

Privacy was a major topic of conversation in 2022 — beyond just keeping personal data out of the hands of cybercriminals. Privacy now ties into many adjacent areas, including Zero Trust security, antitrust concerns, usage of services provided by "Big Tech," and biometric authentication. What's Next?

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Legacy Technology Clashes : Most Telcos have very large legacy IT footprints. This unfortunately does not always integrate well with more modern technologies such as containerized or Kubernetes-based cloud-native applications. Highly Coveted Data : Telcos manage lots of valuable data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

Legacy Technology Clashes : Most Telcos have very large legacy IT footprints. This unfortunately does not always integrate well with more modern technologies such as containerized or Kubernetes-based cloud-native applications. Highly Coveted Data : Telcos manage lots of valuable data.

article thumbnail

Turning Aspiration into Action to Protect Financial Institutions

Thales Cloud Protection & Licensing

Security professionals know adequate security requires encryption, tokenization, authentication, and access management, so why are their good intentions too often sidelined? Here’s a look at four common issues highlighted in the 2019 Thales Data Threat Report-Financial Services Edition and tips for overcoming them. Compliance v.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. The biggest error was underestimating the power of one single account to undo their business and grant access to everyone’s data.