article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

This underpins the digital transformation imperative most of them face today, and the huge responsibility that rests on the shoulders of the CIO. The vast majority (84%) of enterprises are now using, or planning to use, digitally transformative technologies – such as big data, containers, blockchain and the Internet of Things (IoT).

article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

We’ve barely scratched the surface of applying artificial intelligence and advanced data analytics to the raw data collecting in these gargantuan cloud-storage structures erected by Amazon, Microsoft and Google. But it’s coming, in the form of driverless cars, climate-restoring infrastructure and next-gen healthcare technology.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fashion brand Guess hacked, DarkSide ransomware group the likely culprit

SC Magazine

The pandemic has accelerated digital transformation for retailers and further shifted consumer buying habits online, which has expanded their attack surface and heightened the number of vulnerabilities and risks of a breach, said Casey Ellis, founder and CTO at Bugcrowd.

Retail 102
article thumbnail

McAfee Enterprise Continues to be a Leader in CASB and Cloud Security

McAfee

Cloud Security Gateways (CSGs) are one of the hottest and most sought-after technologies in the market today, driven by the adoption of cloud services for business transformation and the acceptance of hybrid workforce policies. Figure 2: MVISION Unified Cloud Edge (UCE) .

article thumbnail

Regional privacy but global clouds. How to manage this complexity?

Thales Cloud Protection & Licensing

Data Protection Officers expressed the difficulties they have to accomplish their mission: to advise on and monitor compliance (as defined in GDPR Article 39). With the acceleration of digital transformation and growing cyber threats, one thing is clear: privacy compliance has never been so important, yet so complex to reach.

article thumbnail

Navigating the Digital Landscape: Insights from the 2024 Thales Digital Trust Index

Thales Cloud Protection & Licensing

Consumer Expectations Privacy Rights and Seamless Online Experiences An overwhelming 87% of consumers expect privacy rights from online interactions, with the most significant expectations being the right to be informed about data collection (55%) and the right to data erasure (53%).

Media 77
article thumbnail

Healthcare – Patient or Perpetrator? – The Cybercriminals Within

Security Affairs

With copious amounts of data collected by healthcare facilities, cybercriminals often target such entities. Moreover, the healthcare industry collects unique data, known as Protected Health Information (PHI), which is extremely valuable. The healthcare industry might be known for the work it does to treat patients.