Remove Digital transformation Remove Encryption Remove Manufacturing Remove Technology
article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

What does this mean for company decision makers, going forward, especially as digital transformation and expansion of the gig economy deepens their reliance on subcontractors? Addressing third-parties Allen founded The Santa Fe Group in 1995 and established it as a leading consultancy, specializing on emerging technologies.

Risk 164
article thumbnail

Thales’ Leading Position in Connectivity & Cybersecurity to Bring Trust to the Next Wave of Connected Cars

CyberSecurity Insiders

PARIS LA DÉFENSE–( BUSINESS WIRE )– Car manufacturers require reliable connectivity and cybersecurity solutions to bring more convenience and secure services for drivers, passengers and automotive players. 29 is the United Nations Economic Commission for Europe (UNECE) World Forum for the Harmonization of Vehicle Regulations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Introducing next-generation firewall from Palo Alto Networks to support 5G-enabled IoT, OT and IT use cases

CyberSecurity Insiders

Digital transformation realized through new 5G-enabled IoT, Operational Technologies (OT) and IT use cases are no exception. Therefore, security teams need to take a closer look at the best technology to support this innovation. Proven, reliable technology and services.

article thumbnail

Usage Scenarios for Externalized Trust

Anton on Security

As we discussed in “The Cloud trust paradox: To trust cloud computing more, you need the ability to trust it less” , there are situations where the encryption key really does belong off the cloud and so trust is externalized. While we argue that these are rarer than some assume, they absolutely do exist.

article thumbnail

Thales CipherTrust Data Security Platform Support for Intel TDX Confidential VMs on Microsoft Azure Thales, Intel, and Microsoft Azure Deliver End-to-End Data Protection

Thales Cloud Protection & Licensing

Meanwhile, organizations continue to invest in digital transformation by utilizing the efficiencies and elasticity offered by cloud service providers. Nearly half (47%) of the respondents of the 2023 Thales Data Threat Report reported that cyberattacks are increasing in volume and severity.

article thumbnail

MY TAKE: Why IoT systems won’t be secure until each and every microservice is reliably authenticated

The Last Watchdog

Related : The promise and pitfalls of IoT At the technology level, two fundamental things must get accomplished. The good news is that the technology to do this – on the fly and at the massive scale required — exists and is being reinforced. And if you’re not doing integrity checks, you’ll be exposed.”

IoT 157
article thumbnail

Building a foundation of trust for the Internet of Things

Thales Cloud Protection & Licensing

In the digital transformation era, companies across all sectors are using next-generation technologies to streamline their operations, deliver value to customers, and gain a competitive edge. Authentic, secure patching ensures that manufacturers can mitigate security issues before cyber criminals can act.