Remove Cloud Migration Remove Digital transformation Remove Encryption Remove Technology
article thumbnail

Securing Data in the Digital Transformation Era

Thales Cloud Protection & Licensing

As organizations continue to embrace digital transformation, greater amounts of sensitive data is created, stored and transferred in digital form putting more data at risk. Also with the increase in cloud, mobile, and IoT devices, a whole new generation of attack surfaces are vulnerable to hackers.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evolution of Cloud Security: From Shared Responsibility to Shared Fate

Thales Cloud Protection & Licensing

These were just some of the major facets of cloud transformation that are creating challenges for data security that I discussed with Sunil Potti, Vice President and General Manager, Google Cloud in a recent Thales Security Sessions podcast moderated by Neira Jones. The digital transformation “mega trends”.

article thumbnail

Thales at GITEX 2021 – An Exciting Time With Exciting News

Thales Cloud Protection & Licensing

If you are unfamiliar GITEX, it is an acronym for Gulf Information Technology Exhibition. What makes it especially interesting is that it is a mix of leading-edge technology, as well as progressive ideas. Identity and security management is one of the challenges of any organization’s cloud migration initiative.

article thumbnail

Best Practices for Your Digital Transformation Journey

Thales Cloud Protection & Licensing

Best Practices for Your Digital Transformation Journey. Do you recall when the phrase “Digital Transformation” seemed like just the latest technology buzzword, and it seemed so far off in the future as to be one of those projects for another day? Entire technology roadmaps must be redrawn. Encryption.

article thumbnail

Why Are We Still Separating Credential Management and Machine Identity Management?

Security Boulevard

For example, cyber criminals can leverage machine identities to evade detection by hiding in encrypted traffic. Digital Transformation Fails without Machine Identity Management. Businesses over the last two years have become increasingly digitized and interconnected. Guest Blogger: Anastasios Arampatzis.

article thumbnail

Q&A: Sophos poll shows how attackers are taking advantage of cloud migration to wreak havoc

The Last Watchdog

Cloud migration, obviously, is here to stay. But there’s no doubt that the exodus to a much greater dependency on hybrid cloud and multi-cloud resources – Infrastructure-as-a-Service ( IaaS ) and Platforms-as-a-Service ( PaaS ) – is in full swing. This is true of the U.S. and other regions as well.