Remove Blog Remove Data breaches Remove Digital transformation
article thumbnail

The C-Suite Power Shift: Why CIOs, CTOs, and CISOs Must Realign to Survive

Jane Frankland

Today, the Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) are rising in prominence—fuelled by the accelerating demands of AI innovation, cybersecurity, and digital transformation. That’s what this blog is all about.

CISO 130
article thumbnail

Protecting Retailers Against Cyber Risks on Black Friday and Cyber Monday

Thales Cloud Protection & Licensing

trillion, the risk of a data breach extends beyond immediate financial losses. According to the latest Thales Consumer Digital Trust Index, over a quarter (26%) of consumers have abandoned a brand in the past 12 months due to privacy concerns. trillion , the risk of a data breach extends beyond immediate financial losses.

Retail 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

You should probably delete any sensitive screenshots you have in your phone right now. Here's why

Zero Day

If you accidentally install the software, it searches your gallery and sends your data to nefarious parties who can wipe out your wallet or target your other accounts. 

article thumbnail

AI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report

Thales Cloud Protection & Licensing

Compliance is More Than a Checkbox The Thales 2025 Data Threat Report particularly reveals the powerful correlation between regulatory compliance and breach prevention. 78% of those surveyed who failed a recent compliance audit had a history of data breaches.

article thumbnail

Level Up Your Security: Embrace Passkeys and Phishing-Resistant 2FA

Thales Cloud Protection & Licensing

Employ advanced 2FA, like security keys or biometrics, for highly sensitive accounts, such as banking, email, or company access, where data breaches have severe consequences. The Future of Authentication: Passkeys and 2FA, Together Used together, Passkeys and 2FA form a formidable defense.

article thumbnail

How boards can manage digital governance in the age of AI

BH Consulting

How should boards approach digital risks? Boards play a crucial role in governing digital transformation. Guardrails: Do organisations manage/limit use of AI and GEnAI and is this policed/enforced. Licences: Are the AI models being used within legal and ethical boundaries?

article thumbnail

Fifteen Best Practices to Navigate the Data Sovereignty Waters

Thales Cloud Protection & Licensing

Understanding the nature of data in cloud migration is crucial for successful cloud migration and handling of sensitive information. Robust Data Management and Governance Robust data management and governance are critical parts of any data protection legislation.