Remove Digital transformation Remove Encryption Remove Presentation Remove Technology
article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. The public key is held by the individual user and the private key is held by the certified server storing the encrypted data.

article thumbnail

How Encryption Became the Board’s New Best Friend

Thales Cloud Protection & Licensing

For many years, encryption has been viewed as a burden on businesses – expensive, complex and of questionable value. The digital transformation conundrum. We are watching the Fourth Industrial Revolution unfold: a sweeping, global shift that will mean “going digital” is no longer optional. Enter encryption.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: How digital technology and the rising gig economy are exacerbating third-party risks

The Last Watchdog

What does this mean for company decision makers, going forward, especially as digital transformation and expansion of the gig economy deepens their reliance on subcontractors? Addressing third-parties Allen founded The Santa Fe Group in 1995 and established it as a leading consultancy, specializing on emerging technologies.

Risk 164
article thumbnail

Forging the Path to Continuous Audit Readiness

CyberSecurity Insiders

Technology oversight is a common mandate across IT and security frameworks and compliance specifications, but achieving that oversight is difficult. First, technology and operational intelligence, across the myriad of users, endpoints, applications and infrastructure, is siloed and fragmented. By Scott Gordon, CISSP, Oomnitza .

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1. are discovered.

article thumbnail

Sound the Quantum Alarm!

Thales Cloud Protection & Licensing

Perhaps you had to encrypt your data as part of a regulatory requirement, or you voluntarily understood the value of encryption, and deployed it as a safeguard. Encryption is one of those technologies that, once it is implemented, is typically fairly easy to manage, as most organizations use cryptography supplied through a vendor.

article thumbnail

Sound the Quantum Alarm!

Thales Cloud Protection & Licensing

Perhaps you had to encrypt your data as part of a regulatory requirement, or you voluntarily understood the value of encryption, and deployed it as a safeguard. Encryption is one of those technologies that, once it is implemented, is typically fairly easy to manage, as most organizations use cryptography supplied through a vendor.