article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than 1,200 senior security executives from around the world, and virtually all (99%) report they plan to use Big Data this year. Top Big Data Security Concerns. Big Data is unstructured.

article thumbnail

Best Encryption Software for 2022

eSecurity Planet

It’s been a couple of decades since data tapes delivered by trucks made encryption a standard enterprise cybersecurity practice. Yet even as technology has changed, sending and receiving data remains a major vulnerability, ensuring encryption’s place as a foundational security practice. What is Encryption?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Homomorphic Encryption Makes Real-World Gains, Pushed by Google, IBM, Microsoft

eSecurity Planet

The increasing mobility of data, as it ping-pongs between clouds, data centers and the edge, has made it an easier target of cybercrime groups, which has put a premium on the encryption of that data in recent years. The data is protected against cybercriminals as well as others who are not supposed to see it.

article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

However, there has to be a more thorough focus on security in multiple clouds environments so encryption with sophisticated multi-cloud key management is a must-have solution. What’s in that Big Data Lake? If you’re leading a global company with sensitive data from countries with data privacy laws (think: EU and GDPR today; U.S.

CISO 72
article thumbnail

Key steps on the road to LGPD compliance

Thales Cloud Protection & Licensing

Brazil, the largest country in both South America and Latin America, released a data privacy law bringing new business opportunities, especially in the international domain. As with any data privacy regulation, any organization subject to LGPD should focus on four key steps: Visibility: you can't analyze what you can't see.

article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

Digital transformation inherently drives organizations into a data driven world – and each technology used for digital transformation (cloud, big data, IoT, blockchain, mobile payments and more) requires its own unique approach to protecting data. Big Data – 99%. Encrypt the data.

article thumbnail

Strategies and Best Practices for Protecting Sensitive Data

Thales Cloud Protection & Licensing

Data breaches continue to occur, in spite of all the perimeter and endpoint security controls being deployed to defend against sophisticated cyber attacks. In addition, a myriad of evolving data privacy and compliance regulations continue to be developed to provide governance over business critical data.