Remove Cyber Risk Remove Cybersecurity Remove Social Engineering Remove Unstructured Data
article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

Much of today’s cybersecurity focuses on maintaining a perimeter defense — not letting malicious actors into the security boundary. Some of these include: Advanced persistent threats (APTs); Insider threats; Social engineering; and, Human error. Perimeter Defense.