Remove Authentication Remove Internet Remove Technology Remove Whitepaper
article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

This problem is magnified by the adoption of newer technologies, such as cloud, big data, internet of things (IoT), software containers and other transformative technologies that make defining a perimeter much more difficult. Perimeter defense, while necessary, is not enough to protect our sensitive data.

article thumbnail

Post-Quantum Cryptography: Lessons Learned from SHA-1 Deprecation

Security Boulevard

“The results of our analysis clearly show that, while the most popular websites have done a good job of migrating away from SHA-1 certificates, a significant portion of the Internet continues to rely on them,” said Walter Goulet, a cloud solutions product manager at Venafi, in 2017. How can we cancel expired certificates? Crypto-agility.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Six existential threats posed by the future of 5G (Part Two)

CyberSecurity Insiders

With the introduction of lockdowns across the globe, our reliance on internet networks to work remotely, call relatives across seas, or even to take part in leisure activities via a screen has soared. billion active internet users worldwide. Notwithstanding this progress, the quality of the internet services provided varies greatly.

Mobile 101
article thumbnail

What is Digital Identity, and why is it important?

CyberSecurity Insiders

Thanks to constant innovations in technology looking to serve an ever-connected population, we’ve seen the rise of digital identity. The same is also true for machines which speak to other machines as part of the Internet of Things (IoT). We have also published a whitepaper on the topic which you can download for free here.

Mobile 98
article thumbnail

Five Hot Security and Privacy Topics You Need To Understand in 2022

Thales Cloud Protection & Licensing

These privacy requirements have many companies looking into more advanced encryption methods – like post-quantum crypto and Quantum Key Distribution (QKD) – to ensure data transmissions across the Internet or network are protected, secure, and compliant with local laws and regulations now and for years to come.

article thumbnail

Top 5 Industries Most Vulnerable to Data Breaches in 2023

Security Boulevard

Data breaches caused by weak security measures and procedures result in severe monetary losses, erosion of clients’ trust, and irreversible reputation damage to organizations in the healthcare, financial services, technology, and retail industries, as well as government and public sector entities.

article thumbnail

Protect 5G to Secure Sustainable Growth

Thales Cloud Protection & Licensing

The adoption of 5G technology will also aid the energy industry, allowing even remote power stations to remain connected with little lag and the best available bandwidth. The success of the technology itself is at the heart of 5G's ability to promote sustainability. Intelligent agriculture. Protecting 5G from cyber threats.