Remove Big data Remove Blog Remove Data privacy Remove Technology
article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

One of our recent blogs highlights tips to help with selecting and confirming trust in your third-party vendors, and this rings true now more than ever. What’s in that Big Data Lake? With the uptick in digital transformation that we’re seeing, Big Data is far and wide, bringing genuine security concerns with it.

CISO 72
article thumbnail

GUEST ESSAY: California pioneers privacy law at state level; VA, VT, CO, NJ take steps to follow

The Last Watchdog

News of data breaches, data vulnerabilities and compromised private information is released almost daily from businesses both small and large. Related: Europe’s GDPR ushers in new privacy era. Legislation has recently been proposed for individual states, addressing data privacy regulations head-on.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

Digital transformation inherently drives organizations into a data driven world – and each technology used for digital transformation (cloud, big data, IoT, blockchain, mobile payments and more) requires its own unique approach to protecting data. Adoption levels are high across the board for these technologies.

article thumbnail

Retail has a multi-cloud problem…with sensitive data

Thales Cloud Protection & Licensing

DX technologies such as cloud, mobile payments, IoT, Big Data and others have fundamentally changed retailers’ business models, not only by opening new channels to reach customers, but also in how they communicate with, serve, and support them. Encryption technologies are the top tools needed.

Retail 54
article thumbnail

2019 Thales DTR: Global Edition: Facts that may surprise you

Thales Cloud Protection & Licensing

Typically, the laggards in adopting new technologies have been those biased toward the lowest risks, and that heavily emphasize using secure and proven approaches to new deployments. If you are rushing to market with new technologies. If you believe that using data security is hard and complex, so you aren’t deploying it.

article thumbnail

Managing Digital Security as Risk and Complexity Rise

Thales Cloud Protection & Licensing

Gartner defines digital risk management as “the integrated management of risks associated with digital business components, such as cloud, mobile, social, big data, third-party technology providers, OT and the IoT.” As Technology Evolves New Vulnerabilities Arise. Encryption of data at rest and in motion.

Risk 48
article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

375 the California Consumer Privacy Act (CCPA), making California the first U.S. state to pass its own data privacy law. Last August, my colleague Ashvin Kamaraju wrote a blog shortly after this took place. 3) Fortunately, there is a lot of overlap in data security and privacy requirements.