Remove Authentication Remove Consumer Protection Remove Marketing Remove Technology
article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

Legacy Technology Clashes : Most Telcos have very large legacy IT footprints. This unfortunately does not always integrate well with more modern technologies such as containerized or Kubernetes-based cloud-native applications. Encryption Melody Wood | Partner Solutions Marketing Manager, Thales More About This Author > Schema

article thumbnail

MY TAKE: Why Satya Nadella is wise to align with privacy advocates on regulating facial recognition

The Last Watchdog

You may not have noticed, but there has been a flurry of breakthroughs in biometric technology, led by some leapfrog advances in facial recognition systems over the past couple of years. The partners aim to combine fingerprint and facial data to more effectively authenticate employees in workplace settings. Ubiquitous surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Security Boulevard

Legacy Technology Clashes : Most Telcos have very large legacy IT footprints. This unfortunately does not always integrate well with more modern technologies such as containerized or Kubernetes-based cloud-native applications. The more variations in the environment, the more complicated it is to manage.

article thumbnail

Robocall Legal Advocate Leaks Customer Data

Krebs on Security

The Blacklist Alliance provides technologies and services to marketing firms concerned about lawsuits under the Telephone Consumer Protection Act (TCPA), a 1991 law that restricts the making of telemarketing calls through the use of automatic telephone dialing systems and artificial or prerecorded voice messages.

Mobile 317
article thumbnail

Turning Aspiration into Action to Protect Financial Institutions

Thales Cloud Protection & Licensing

Security professionals know adequate security requires encryption, tokenization, authentication, and access management, so why are their good intentions too often sidelined? Further exacerbating this challenge, half of the respondents say they’re aggressively disrupting markets with transformative technologies. Compliance v.

article thumbnail

The CPRA: What You Should Know as an InfoSec Professional

SecureWorld News

Describing the dual-enforcement aspect of the CPRA and CCPA, with the California Attorney General and California Consumer Protection Agency having oversight and enforcement power. Deploy technologies and tools that help you scale data management in a manageable way. Training for employees (awareness).

InfoSec 78