Remove Big data Remove Cybersecurity Remove Digital transformation Remove Internet
article thumbnail

European Businesses Signal ‘Growing Security Gap’ Amid Mass Digital Transformation

Thales Cloud Protection & Licensing

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business. Upwards of 84% of enterprises are using, or planning to use, digitally transformative technologies such as cloud, big data, containers, blockchain and the Internet of Things (IoT).

article thumbnail

C3.ai Digital Transformation Institute Announces AI for Energy and Climate Security Grantees

CyberSecurity Insiders

ai Digital Transformation Institute ( C3.ai ai DTI awards, focused on using artificial intelligence (AI) techniques and digital transformation to advance energy efficiency and lead the way to a lower-carbon, higher-efficiency economy that will ensure energy and climate security. ai Digital Transformation Institute.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

European businesses signal ‘growing security gap’ amid mass digital transformation

Thales Cloud Protection & Licensing

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business. Upwards of 84% of enterprises are using, or planning to use, digitally transformative technologies such as cloud, big data, containers, blockchain and the Internet of Things (IoT).

article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

Our annual Thales Data Threat Report-Federal Edition , released today, found that 98% of federal agencies are storing sensitive data within a digitally transformative environment. The cloud, arguably not an “emerging” technology, has picked up more speed as a digitally transformative environment for government agencies.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

The Peloton, Experian and Capital One hacks reflect the challenge of balancing security with the fast pace of digital transformation. Obviously, companies are going to have to come to grips with API exposures or digital transformation may come at too great a cost. Traditional approaches just aren’t working or can’t scale.

Big data 240
article thumbnail

Critical Event Management (CEM) Leader Everbridge Completes Acquisition of xMatters to Accelerate Digital Transformation for Enterprise IT and Cyber Resilience

CyberSecurity Insiders

(NASDAQ: EVBG), the global leader in critical event management ( CEM ), today announced the completion of its acquisition of xMatters, a leading provider of IT Service Operations, Cybersecurity and DevOps incident response management. All other product or company names mentioned are the property of their respective owners.

article thumbnail

MY TAKE: How advanced automation of threat intel sharing has quickened incident response

The Last Watchdog

Related: Ground zero for cybersecurity research Having covered the cybersecurity industry for the past 15 years, it’s clear to me that there are two primary reasons. One is the intensely competitive nature of organizations, and the other has to do with the escalating digitalization of commerce. Talk more soon.

Big data 153