Remove Big data Remove Blog Remove Risk Remove Technology
article thumbnail

Protecting Big Data, while Preserving Analytical Agility

Thales Cloud Protection & Licensing

The age of Big Data is upon us. And, as more data is available for analytical purposes, more sensitive and private information is at risk. Protecting the confidentiality and integrity and of warehoused data and ensuring that access is controlled is vital to keeping that data secure. respondents.”.

article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

With many of these transformations, it is not just the premise of keeping up that drives the huge levels of investment we see organisations making – but also the promise of what’s possible, if the right technologies and approaches can be harnessed to disrupt or differentiate in the face of fierce competition. Blockchain. Containers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

In this blog post, I’ll discuss: Our current perimeter defense; The need to shift to a data-centric security approach; and, The need to educate the public to strengthen our critical infrastructure security posture. Perimeter defense, while necessary, is not enough to protect our sensitive data.

article thumbnail

Anomali Appoints Chris Peterson as Vice President of Global Channel and Technology Partnerships

CyberSecurity Insiders

.–( BUSINESS WIRE )– Anomali , the leader in intelligence-driven extended detection and response (XDR) cybersecurity solutions, today announced that Chris Peterson has been named Vice President of Global Channel and Technology Partnerships. Blog: [link]. Twitter: [link]. LinkedIn: [link]. Detect LIVE Conference: [link].

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that. In 1971, researcher Bob Thomas and his team at BBN Technologies created a virus that was later coined the “Creeper” worm.

article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

International workforces can be an excellent way to find top talent, but they can introduce unique security risks. Inconsistent data regulations. Countries have different data security laws, and these can get in the way of one another. Surveillance gives cybercriminals another potential point of entry to see or steal your data.

Internet 223
article thumbnail

Multi-cloud use by healthcare providers puts patient data at risk

Thales Cloud Protection & Licensing

healthcare organizations are nearly universal in the adoption of digital transformation technologies (cloud, SaaS applications, big data, IoT, digital payments, containers, and blockchain). Encryption technologies are the top tools needed – and healthcare’s data encryption usage for critical systems is low.