Remove Authentication Remove Digital transformation Remove Encryption Remove Webinar
article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

This year the report focuses on the post digital transformation era. In previous years, we have discussed the efforts of businesses to digitally transform their processes to maintain or gain a competitive advantage and many of these transformative technologies involves moving to the cloud.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1. are discovered.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Public Sector Cybersecurity Priorities in 2021

Security Boulevard

HelpSystems’ award-winning MFT solution uses encryption and authentication to keep sensitive data secure when sharing files. Manage Digital Transformation and the Move to Office 365. Webinar: How to Enhance Data Loss Prevention in Office 365. Achieving both requires a combination of agility and forward-thinking.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use. How safely are you managing machine identities for IoT devices?

IoT 86
article thumbnail

How You Can Effectively Manage Your SSH Keys Towards Zero Trust Security

Security Boulevard

It is the de-facto standard for remote administration of servers, with SSH keys acting as identities to enable automated authentication, encryption, and authorization. Because of the ongoing digital transformation efforts, large enterprises have accumulated tens of thousands of SSH keys in their environment.

Risk 52
article thumbnail

Turning Aspiration into Action to Protect Financial Institutions

Thales Cloud Protection & Licensing

Security professionals know adequate security requires encryption, tokenization, authentication, and access management, so why are their good intentions too often sidelined? Financial services providers need to implement solutions that span legacy concerns as well as modern, cloud-based digital transformation technologies.

article thumbnail

Phishing-resistant MFA 101: What you need to know

CyberSecurity Insiders

The spread of the remote workforce and the growth of digital transformation has exponentiated the number of login-based attack vectors. To give you a complete picture, I have identified key terminology and concepts surrounding phishing-resistant authentication and put them together in this handy glossary.

Phishing 109