Remove Cloud Migration Remove Digital transformation Remove Encryption Remove Government
article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1.

article thumbnail

Evolution of Cloud Security: From Shared Responsibility to Shared Fate

Thales Cloud Protection & Licensing

These were just some of the major facets of cloud transformation that are creating challenges for data security that I discussed with Sunil Potti, Vice President and General Manager, Google Cloud in a recent Thales Security Sessions podcast moderated by Neira Jones. The digital transformation “mega trends”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thales at GITEX 2021 – An Exciting Time With Exciting News

Thales Cloud Protection & Licensing

This included presentations by Ministers and Heads of Government, who shared information about innovation in their countries, YouthX, which brought together young innovators, and the leaders of more than 40 women-led startups. Identity and security management is one of the challenges of any organization’s cloud migration initiative.

article thumbnail

We’ve moved to the cloud. Now, where on earth did I put those keys?

Thales Cloud Protection & Licensing

The move to the cloud or the transition to multiple clouds is likely the case for the vast majority of enterprise IT infrastructures. We are all increasingly aware that digital transformation is everywhere and affecting everyone and everything we do. Learn how Guardium can ease cloud migration.

article thumbnail

Why Are We Still Separating Credential Management and Machine Identity Management?

Security Boulevard

For example, cyber criminals can leverage machine identities to evade detection by hiding in encrypted traffic. Control and govern the management program. Although cloud service providers have launched native identity and access management solutions, the best practice is to segregate duties and opt for a neutral solution.

article thumbnail

Own Your Cloud Security

Thales Cloud Protection & Licensing

theme will help to encourage personal accountability and proactive behavior in digital privacy, security best practices, common cyber threats and cybersecurity careers. As part of their digital transformation process, more and more businesses are moving to the cloud. Bring Your Own Key to the Cloud. Protect IT.’

article thumbnail

The Difference Between Human and Machine Identities

Security Affairs

As digital transformation is advancing and automation is becoming an essential component of modern enterprises, collaboration between humans and machines is crucial. For example, threat actors frequently hide attacks in encrypted traffic. Collaboration between humans and machines is a working reality today.