article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Most Organizations Expect Ransomware Attack Within a Year

CyberSecurity Insiders

Cybersecurity Insiders CEO and Founder Holger Schulze will join Steve Hahn, BullWall EVP at 11:00am ET on June 15, 2023, to review the findings and share recommendations during the webinar “ Why EDRs And Other Preventative Measures Cannot Stop Ransomware and What To Do Instead.” BullWall is the last line of defense for active attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud

Thales Cloud Protection & Licensing

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud. With customers increasingly being less trusting of how companies store and process their data in the cloud, encrypting this data and controlling the encryption keys is essential for building trust. Thu, 03/04/2021 - 09:38.

article thumbnail

BH Consulting webinar looks at EU data transfer fallout from Schrems II

BH Consulting

In our latest webinar, we looked at the EU data transfer fallout from Schrems II. Any company transferring data outside the EU needs to identify any risks arising from international transfers to ensure it can comply with EU levels for protecting personal data. Transfer Impact Assessments and their role in understanding risk.

Risk 52
article thumbnail

Defining Good: A Strategic Approach to API Risk Reduction

Security Boulevard

How do we gauge how risky it is and how do we ensure that future APIs are not putting the enterprise at risk? This can not be done without major risk unless organizations have created and mandated corporate standards on what a "good" API actually is from a security standpoint. Defining and sharing what good means.

Risk 57
article thumbnail

Implementing Data Protection and Key Management in DevOps without slowing things down

Thales Cloud Protection & Licensing

Plus, insecure implementations can leave sensitive data at risk. All secrets are being encrypted or tokenized, and data appears secure.These processes require encryption keys, and controlling these keys requires a robust key management process. These are the critical credentials to access IT and other high value resources.

article thumbnail

Anatomy of a Quantum Attack

Thales Cloud Protection & Licensing

A conventional computer would need 300 trillion years to break RSA encryption – considered the gold standard for Public Key Encryption (PKE). During a recent webinar , we discussed the potential impacts from a quantum-age cyberattack and the scenarios are chilling. A quantum computer will be able to do it in 10 seconds!