article thumbnail

Use cases of secure IoT deployment

Thales Cloud Protection & Licensing

Use cases of secure IoT deployment. In our previous blog post , we discussed the challenges for securing IoT deployments, and how businesses and consumers benefit from authenticating and validating IoT software and firmware updates. Tue, 06/01/2021 - 06:55. Use case 1: Fortune 500 Healthcare Company.

IoT 71
article thumbnail

NEW TECH: Silverfort helps companies carry out smarter human and machine authentications

The Last Watchdog

LW: What obstacles are companies running into with cloud migration? Tamir: The problem is that companies have thousands of applications and systems that they need to migrate to the cloud, including older applications and homegrown applications. This becomes a barrier to cloud migration.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: Introducing ‘CWPP’ and ‘CSPM,’ new frameworks to secure cloud infrastructure

The Last Watchdog

I recently had the chance to sit down with Kevin Simzer, chief operating officer of Trend Micro, to discuss two of them: Cloud Workload Protection Platform ( CWPP ) and Cloud Security Posture Management ( CSPM.) Here are the key takeaways: Cloud migration risks. It’s going to take a paradigm shift, Simzer says.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. While digital transformation increases our agility to adapt mission-critical initiatives and take advantage of faster time to deployment, it also comes with risks. are discovered.

article thumbnail

How to shift into a new approach to cybersecurity asset management

CyberSecurity Insiders

A new approach to asset management is required to address the lack of visibility and security risks therein. Cybersecurity asset management is a process that involves identifying the IT assets such as PCs, servers, IoT devices, and databases that are owned by an organization. What is cybersecurity asset management.

article thumbnail

MY TAKE: DigiCert and Oracle partner to extend digital trust and scalable infrastructure globally

The Last Watchdog

This was all part of the Lehi, Utah-based vendor’s efforts to support enterprise cloud migration and the rise of IoT systems, which were both gaining steam. Our focus has been on reducing the risk of business disruption, protecting attack surfaces and delivering identity-based digital innovation with ease.”

article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. Teeming threat landscape Security leaders’ key priority is reducing exposures to the cyber risks they know are multiplying. Speed is what digital transformation is all about. Here are a few key takeaways.