Remove Digital transformation Remove Encryption Remove Hacking Remove IoT
article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

This is so in spite of the fact that machine identities are exploding in numbers and have come to saturate digital transformation. Related: IoT exposures explained I’ve conversed several times with Jeff Hudson about this. This is how cool new digital services are getting spun up at high velocity.

article thumbnail

Making the Case for Encryption in the Era of Digital Transformation – Highlights from our Annual Data Threat Report

Thales Cloud Protection & Licensing

Now in its sixth year, the report is squarely focused on digital transformation and what that means for organizations and their data security. When it comes to digital transformation, organizations are rushing to meet the demand, by leadership or customers, to deploy transformative technologies as a competitive edge.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC 2019 Blog Series: Taking the Risk out of Digital Transformation: RSAC 2019’s Quest for Delivering “Better”

Thales Cloud Protection & Licensing

However, in an attempt to be “better” many organizations have leaned heavily on emerging technologies such as cloud, blockchain and IoT – aka digital transformation. However, as digital transformation proves “better” for many aspects, it isn’t proving to be better for security.

article thumbnail

MY TAKE: Why new tools, tactics are needed to mitigate risks introduced by widespread encryption

The Last Watchdog

It was just a few short years ago that the tech sector, led by Google, Mozilla and Microsoft, commenced a big push to increase the use of HTTPS – and its underlying TLS authentication and encryption protocol. Related: Why Google’s HTTPS push is a good thing At the time, just 50 % of Internet traffic used encryption.

article thumbnail

SHARED INTEL: Automating PKI certificate management alleviates outages caused by boom

The Last Watchdog

PKI and digital certificates were pivotal in the formation of the commercial Internet, maturing in parallel with ecommerce. Digital certificates get issued publicly, by a CA, or privately by an individual company for users and servers. This is how we authenticate human and machine identities and move encrypted data between endpoints.

article thumbnail

SHARED INTEL: Report details how cyber criminals leverage HTTPS TLS to hide malware

The Last Watchdog

TLS is a component of the Public Key Infrastructure, or PKI , the system used to encrypt data, as well as to authenticate individual users and the web servers they log onto. In short, TLS helps preserve the integrity of legitimate digital connections. In short, TLS helps preserve the integrity of legitimate digital connections.

Malware 214
article thumbnail

Federal cybersecurity: breaking down the barriers to adoption

Thales Cloud Protection & Licensing

Over the last two election cycles, we’ve seen an increased focus on election security, hacking and fraud. While many state and government officials are under no illusion that they are safe from a digital attack, concern should run deeper than election integrity. Security measures continue to be more reactive than proactive.