article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. However, there has to be a more thorough focus on security in multiple clouds environments so encryption with sophisticated multi-cloud key management is a must-have solution. How Do You Select a Trusted Vendor?

CISO 72
article thumbnail

The challenge of shared responsibility in the cloud – Whose keys are they, anyway?

Thales Cloud Protection & Licensing

Key management – the processing, management and storage of keys for who can decrypt and access protected information – is an often-overlooked, and yet critical element of encryption. This lack of centralized control can jeopardize the integrity of encryption. However, merely encrypting sensitive data in the cloud is not sufficient.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

National Day of Unplugging – how switching off can boost business security

Thales Cloud Protection & Licensing

Before implementing any long-term security strategy, CISOs must first conduct a data sweep. The 2020 Thales Data Threat Report Global Edition found that no organization is immune from data security threats, with 49% of global respondents experiencing a breach at some point and 26% having been breached in the past year.

article thumbnail

Federal Government is Excelling at Digital Transformation While Security Challenges Gain Ground

Thales Cloud Protection & Licensing

This year’s 2020 Thales Data Threat Report – Federal Government Edition reveals that as the U.S. This year’s report also tells us that the vast majority (71%) of federal IT professionals believe data is very secure – a finding that’s incongruent with reality. Breach rates continue to rise and encryption is still too low.

article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

These vulnerabilities can span from limited use of data encryption to the abuse of privileged user policies. Our annual Thales Data Threat Report-Federal Edition , released today, found that 98% of federal agencies are storing sensitive data within a digitally transformative environment. Regulations Stoke the Flames.

article thumbnail

Data security is everyone’s responsibility

Thales Cloud Protection & Licensing

We’ve also addressed what key executives, especially CISOs, should be thinking about as data moves and is accessed across their organizations. If it’s encrypted, it should stay that way. If it’s not encrypted – maybe it should be. Now, we turn our attention to best practices for data security.

article thumbnail

Securing Containers for GDPR Compliance

Thales Cloud Protection & Licensing

Nearly one-quarter (24%) of the respondents to the 2018 Thales Data Threat Report (DTR) survey 1 indicate they already are using containers in production. Encrypting or pseudonymization of sensitive data. Monitoring and reporting user access patterns. Container Adoption and Security Concerns.