Remove Authentication Remove Digital transformation Remove Technology Remove Webinar
article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

This year the report focuses on the post digital transformation era. In previous years, we have discussed the efforts of businesses to digitally transform their processes to maintain or gain a competitive advantage and many of these transformative technologies involves moving to the cloud.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1. are discovered.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Blog: Why it’s Critical to Orchestrate PKI Keys for IoT

Thales Cloud Protection & Licensing

Because IoT devices typically have limited CPU and storage capabilities, many devices transmit data in the clear and with limited authentication capabilities to a central collection unit where it can be collected, stored, analyzed and securely transmitted for additional use. How safely are you managing machine identities for IoT devices?

IoT 86
article thumbnail

Thales and Microsoft partner to provide Azure customers with FIDO and CBA phishing-resistant authentication

Thales Cloud Protection & Licensing

Thales and Microsoft partner to provide Azure customers with FIDO and CBA phishing-resistant authentication. The accelerating digital transformation of organizations around the world and the adoption of a hybrid workforce have exposed essential systems and sensitive data to rising cyber threats. Thu, 10/13/2022 - 10:27.

article thumbnail

Phishing-resistant MFA 101: What you need to know

CyberSecurity Insiders

The spread of the remote workforce and the growth of digital transformation has exponentiated the number of login-based attack vectors. To give you a complete picture, I have identified key terminology and concepts surrounding phishing-resistant authentication and put them together in this handy glossary.

Phishing 109
article thumbnail

Turning Aspiration into Action to Protect Financial Institutions

Thales Cloud Protection & Licensing

Security professionals know adequate security requires encryption, tokenization, authentication, and access management, so why are their good intentions too often sidelined? Further exacerbating this challenge, half of the respondents say they’re aggressively disrupting markets with transformative technologies.

article thumbnail

Cloud Security Best Practices To Increase Visibility Across Applications

Digital Shadows

As enterprises are accelerating the adoption of digital transformation, the attack surface is rapidly expanding into cloud and multi-cloud environments. For example, AWS CloudTrail surfaces not only user access but user commands after authentication. Check out our quick 10-minute webinar for your must-have security needs.