article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches. With the global spend on digital transformation slated to reach a whopping $2.3

article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

They outlined why something called attribute-based encryption, or ABE, has emerged as the basis for a new form of agile cryptography that we will need in order to kick digital transformation into high gear. As we press ahead into our digital future, however, we’ll also need to retool the public-key-infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

Cyber defense should be part of every power grid’s digital transformation strategy–not only to ensure the power generation and reliability of the grid, but also to protect sensitive or private data. Best Practices to Secure Critical Infrastructure. All these measures are considered best practices for data protection.

article thumbnail

How to Meet Phishing-Resistant MFA

Thales Cloud Protection & Licensing

CISA strongly urges system administrators and other high-value targeted users (attorneys, HR Staff, Top Management.) Highly targeted resources such as email systems, file servers, remote access systems must be protected with phishing -resistant authentication in priority.

Phishing 118
article thumbnail

How to Overcome Common SSH Machine Identity Risks with Automation

Security Boulevard

Higher levels of automation for system administrators. Together, encryption key governance is achieved across the entire enterprise, protecting the full life cycle of keys from creation to termination, including the storage and auditing of those keys. Digital Transformation Fails without Machine Identity Management.

Risk 52