article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

These vulnerabilities can span from limited use of data encryption to the abuse of privileged user policies. However, modernization and transformative technologies are creating new vulnerabilities resulting in data breaches. Data Breaches aren’t Slowing Down. The problem? Regulations Stoke the Flames.

article thumbnail

Spotlight Podcast: Managing the Digital Risk in your Digital Transformation

The Security Ledger

» Related Stories Report: Companies Still Grappling with IoT Security Podcast Episode 141: Massive Data Breaches Just Keep Happening. He was also my guest at a special webinar “ Mastering Digital Risk: Taking on Digital Transformation.” We also take some time to respond to questions from the webinar.

article thumbnail

Organizations Struggle with Cloud Security in the Post Digital Transformation Era – Highlights from our 2020 Data Threat Report-Global Edition

Thales Cloud Protection & Licensing

Beyond alleviating cloud concerns, encryption was identified as the top tool to drive the use of other digitally transformative technologies like, big data, IoT and containers, according to the 2020 Thales Data Threat Report-Global Edition. Yet, despite their significance, rates of data encryption and tokenization are low.