Remove Cloud Migration Remove Digital transformation Remove Encryption Remove Risk
article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

As organizations continue to embrace digital transformation, greater amounts of sensitive data is created, stored and transferred in digital form putting more data at risk. Also with the increase in cloud, mobile, and IoT devices, a whole new generation of attack surfaces are vulnerable to hackers.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evolution of Cloud Security: From Shared Responsibility to Shared Fate

Thales Cloud Protection & Licensing

These were just some of the major facets of cloud transformation that are creating challenges for data security that I discussed with Sunil Potti, Vice President and General Manager, Google Cloud in a recent Thales Security Sessions podcast moderated by Neira Jones. The digital transformation “mega trends”.

article thumbnail

We’ve moved to the cloud. Now, where on earth did I put those keys?

Thales Cloud Protection & Licensing

The move to the cloud or the transition to multiple clouds is likely the case for the vast majority of enterprise IT infrastructures. We are all increasingly aware that digital transformation is everywhere and affecting everyone and everything we do. Learn how Guardium can ease cloud migration.

article thumbnail

Why Are We Still Separating Credential Management and Machine Identity Management?

Security Boulevard

Coordinating that many systems can, at a minimum, create operational complexity, but it can also increase the risk of errors or misconfigurations creating security gaps. For example, cyber criminals can leverage machine identities to evade detection by hiding in encrypted traffic. Guest Blogger: Anastasios Arampatzis.

article thumbnail

Own Your Cloud Security

Thales Cloud Protection & Licensing

theme will help to encourage personal accountability and proactive behavior in digital privacy, security best practices, common cyber threats and cybersecurity careers. As part of their digital transformation process, more and more businesses are moving to the cloud. Bring Your Own Key to the Cloud. Protect IT.’

article thumbnail

Unlocking the Cloud: Microsoft and Thales Spearhead Passwordless & MFA for Organizations moving to Microsoft 365.

Thales Cloud Protection & Licensing

Crucially, this award recognizes the teamwork carried out over several years by Microsoft and Thales to help organizations secure their identities when migrating to the cloud. Multi-Factor Authentication: the mandatory first step for organizations moving to the cloud. markets.