article thumbnail

How the new Spirion-Thales partnership enables sensitive-data-centric encryption

Thales Cloud Protection & Licensing

How the new Spirion-Thales partnership enables sensitive-data-centric encryption. To meet the challenges of modern perimeterless, data-driven enterprises, it’s no longer enough to lock down the network. The security must be embedded with the data wherever it travels. Thales CipherTrust Transparent Encryption.

article thumbnail

Don't Encrypt Everything; Protect Intelligently

Thales Cloud Protection & Licensing

Don't Encrypt Everything; Protect Intelligently. The volume of confidential documents created daily is, frankly, incalculable, and the volume of “everything” distributed across multiple data centers around the world is much, much more. Encrypting everything is time intensive because of explosive data growth.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

Former Amazon programmer Paige Thompson is facing a growing list of federal charges for her alleged theft of personal data of more than 100 million Capital One patrons. Court documents depict in some detail how Thompson misused authenticated and authorized credentials to perform her attack.

Big data 240
article thumbnail

Security Considerations for Data Lakes

eSecurity Planet

Essentially, we are securing an app at scale with enormous requirements for stored data, incoming data, data interactions, and network connections. Given the importance of “Big Data” analytics and applications to a company’s financial performance, securing data lakes is a critical priority for security teams.

article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

It’s abundantly clear that medium to larger enterprises (the focus of the report and underlying survey) are finding it harder than ever to protect their sensitive data. What we found is that 94% are using sensitive data within these environments. Big Data – 99%. The failure to adopt modern data security methods.

article thumbnail

API Security Fundamentals

Security Boulevard

Documentation is always incomplete and often out of date. Document your APIs: Documentation helps people understand how an API is built or integrated. You especially need documentation for design reviews, security testing, and protection. Then update your documentation accordingly. .

article thumbnail

Leveraging PCI DSS Principles for General Data Protection

Thales Cloud Protection & Licensing

By leveraging the encryption, access control/monitoring and key management technology that is being deployed as part of its PCI DSS compliance efforts, an organization could then start to deliver effective data protection in a variety of ways for its critical assets. Proven effective tools at your fingertips.