Remove Cloud Migration Remove Digital transformation Remove Presentation
article thumbnail

Best Practices for Your Digital Transformation Journey

Thales Cloud Protection & Licensing

Best Practices for Your Digital Transformation Journey. Do you recall when the phrase “Digital Transformation” seemed like just the latest technology buzzword, and it seemed so far off in the future as to be one of those projects for another day? Two main challenges involve application modernization and cloud migration.

article thumbnail

Anton’s Security Blog Quarterly Q2 2025

Anton on Security

“Use Cloud Securely? How CISOs need to adapt their mental models for cloud security” [GCP blog] “Who Does What In Cloud Threat Detection?” Cloud Migration Security Woes” “Move to Cloud: A Chance to Finally Transform Security?” What Does This Even Mean?!” “How It’s a multicloud jungle out there.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Anton’s Security Blog Quarterly Q1 2025

Anton on Security

Does the World Need Cloud Detection and Response(CDR)? Use Cloud Securely? How CISOs need to adapt their mental models for cloud security [GCPblog] Who Does What In Cloud Threat Detection? Cloud Migration SecurityWoes Move to Cloud: A Chance to Finally Transform Security?

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1.

article thumbnail

The Role Zero Trust Plays in Combating Privileged Credential Attacks

CyberSecurity Insiders

Due to the remote work boom and accelerated digital transformation projects, many of those conversations and exchanges are online. Credential-based attacks continue to present a risky situation for security teams because of the inability to recognize friend from foe. By Tony Goulding, cybersecurity evangelist, ThycoticCentrify.

article thumbnail

Anton’s Security Blog Quarterly Q2 2025

Security Boulevard

“Use Cloud Securely? How CISOs need to adapt their mental models for cloud security” [GCP blog] “Who Does What In Cloud Threat Detection?” Cloud Migration Security Woes” “Move to Cloud: A Chance to Finally Transform Security?” What Does This Even Mean?!” “How It’s a multicloud jungle out there.

article thumbnail

Obstacles and Opportunities: The Move to Cloud IAM

Security Boulevard

Many of the early adopters were particularly concerned about security, and tested the waters with non-essential apps that were easy to migrate and presented minimal risk. So, it only makes sense that organizations would look to move IAM to the cloud as part of their overall digital transformation initiatives.