Remove Encryption Remove Risk Remove Technology Remove Webinar
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud

Thales Cloud Protection & Licensing

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud. With customers increasingly being less trusting of how companies store and process their data in the cloud, encrypting this data and controlling the encryption keys is essential for building trust. Thu, 03/04/2021 - 09:38.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Defining Good: A Strategic Approach to API Risk Reduction

Security Boulevard

How do we gauge how risky it is and how do we ensure that future APIs are not putting the enterprise at risk? Unfortunately, the security challenges associated with APIs can't be solved by simply updating existing testing tools and edge security defenses to check-the-box technologies that claim to provide "API security."

Risk 59
article thumbnail

Why organizations need to prioritize a PQC-readiness lab

Thales Cloud Protection & Licensing

Why organizations need to prioritize a PQC-readiness lab madhav Tue, 02/13/2024 - 05:25 It’s an exciting time for technology – we are on the cusp of seeing some innovative and disruptive new technologies emerge that will have impacts on every industry and sector around the globe.

article thumbnail

Implementing Data Protection and Key Management in DevOps without slowing things down

Thales Cloud Protection & Licensing

Plus, insecure implementations can leave sensitive data at risk. All secrets are being encrypted or tokenized, and data appears secure.These processes require encryption keys, and controlling these keys requires a robust key management process. These are the critical credentials to access IT and other high value resources.

article thumbnail

Multi-cloud use by healthcare providers puts patient data at risk

Thales Cloud Protection & Licensing

healthcare organizations are nearly universal in the adoption of digital transformation technologies (cloud, SaaS applications, big data, IoT, digital payments, containers, and blockchain). Encryption technologies are the top tools needed – and healthcare’s data encryption usage for critical systems is low.

article thumbnail

Forrester and Accenture on Schrems II and the Security of International Data Flows

Thales Cloud Protection & Licensing

Recently, Security Advisor Neira Jones moderated a very interesting webinar to discuss the implications of the Schrems II ruling and what organizations can do to prevent unlawful cases of data transfers. Businesses should do a risk assessment, determine the legal basis of their data transfers, and protect their data in the right way.