Remove Blog Remove CISO Remove Digital transformation Remove Threat Reports
article thumbnail

Federal Government is Excelling at Digital Transformation While Security Challenges Gain Ground

Thales Cloud Protection & Licensing

government is excelling with digital transformation (DX) which is critical in this time of crisis as the cloud becomes a crucial dynamic with the world working remotely. New digital capabilities are enabling data to be more fully utilized. As the U.S. Some good news: the U.S. Business continuity depends on it.

article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. One of our recent blogs highlights tips to help with selecting and confirming trust in your third-party vendors, and this rings true now more than ever. What’s in that Big Data Lake?

CISO 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

However, modernization and transformative technologies are creating new vulnerabilities resulting in data breaches. Our annual Thales Data Threat Report-Federal Edition , released today, found that 98% of federal agencies are storing sensitive data within a digitally transformative environment. Federal Agencies.”

article thumbnail

Maintaining Cybersecurity During Rapid Digital Transformation

Security Boulevard

<a href='/blog?tag=Cybersecurity'>Cybersecurity</a> tag=Cybersecurity'>Cybersecurity</a> <a href='/blog?tag=Ransomware'>Ransomware</a> tag=Ransomware'>Ransomware</a> <a href='/blog?tag=Cyber-attacks'>Cyber-attacks</a> The evolving cyber threat landscape.

article thumbnail

Data security is everyone’s responsibility

Thales Cloud Protection & Licensing

This year, we’ve written about what the future holds in terms digital transformations and new and exciting technologies. We’ve also addressed what key executives, especially CISOs, should be thinking about as data moves and is accessed across their organizations. Now, we turn our attention to best practices for data security.