EU Regulators Take Another Step Forward with eIDAS Standards

Posted By: Kristina Cairns, @kcairns2020 (Twitter)
20 Mar
2017
Categories : Data Security            Leave a comment           

A new protection profile has been introduced, giving manufacturers a standard by which to certify Hardware Security Modules (HSMs). The new protection profile, which is expected to be accepted under eIDAS (EU regulation 910/2014), provides a common EU standard for HSMs. Thales e-Security HSMs that are certified to this standard will meet EU governmental requirements for HSM procurement across the whole of the EU, where in many cases the American FIPS 140 standard has not been acceptable. ANSSI, the French […]

Using Cloud, IoT, Big Data and Containers Sensitive Data – Without Data Security

Posted By: Andy Kicklighter, @akicklighter (Twitter)
16 Mar
2017
Categories : Data Security            Leave a comment           

Releasing today is our 2017 Thales Data Threat Report – Advanced Technology Edition.  In this edition of the report, we extend the findings from our “Global” edition with the details of how enterprises are adopting and using Cloud, Big Data, IoT and Containers (like Docker) with an emphasis on their use of sensitive data within these environments. Click to Tweet: 93% using #Cloud#IoT#BigData #Containers without Data Security #2017DataThreat bit.ly/2mCQgMY pic.twitter.com/5xueeNA2jr The top finding from the report?  The way that many […]

Proactively protecting the public sector

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
14 Mar
2017
Categories : Data Security            Leave a comment           

Initiatives to digitally transform the UK government are happening across the board. The NHS, for example, is preparing to become paperless by 2020 and Her Majesty’s Revenue and Customs (HMRC) has been granted £1.3 billion in funding to initiate digital transformation. Meanwhile, the Department for Work and Pensions is investing heavily in big data technologies to drive automation, identify errors and tackle fraud. Yet, while these innovative programmes undoubtedly have their benefits, they do unfortunately make the government an increasingly […]

Categories : Data Security            Leave a comment           

Our recent blog (UK Government PKI) reflected on enterprise cryptographic products being used successfully to protect UK Government IT Systems, with a particular focus on public key infrastructures. Indeed, the application of hardware security modules (HSMs) to protect keys in a certified hardware environment is now broadening to support the demand for higher assurance security in other areas of IT. For example, cloud service providers are now embedding HSMs into their data centres to allow organisations to take advantage of […]

10 Years of Technology Advances: Who Were the Winners?

Posted By: Alan Kessler, @kessalan
07 Mar
2017
Categories : Data Security            Leave a comment           

If you can believe it, it’s been 10 years since Steve Jobs introduced the first iPhone. It was sold only by Cingular Wireless (AT&T), and used GPRS and EDGE for data transfer. Needless to say, much has changed since then. And mobile computing isn’t the only technology that has captured attention and taken hold in the enterprise. As we look at how recent technology advancements have impacted the industry, we should also note that it has greatly affected every organization’s […]

Categories : Data Security            Leave a comment           

Earlier this year, it was reported that Britain is worryingly ‘highly vulnerable’ to a powerful cyber-attack. One of the main factors behind statement? A shortage in skilled security staff. As cyber-criminals become more targeted, and successful, in their efforts to hack organisations across all industries, the number of cyber security job vacancies in Britain has indeed risen by 30 percent between 2014 and 2016. However, candidate numbers are failing to keep pace. In fact, a study from the Centre for […]

Categories : Data Security            Leave a comment           

You can read every review about a car, but you won’t begin to appreciate it until you go to a dealer and drive it. So it goes with nearly any product. For information technology buyers, it’s a big challenge: IT product vendors layer additional capabilities and features on core products. You read about them on data sheets, watch demonstration videos, even start to touch products at trade show demos (often with a member of staff standing a bit too close). […]

Categories : Data Security            Leave a comment           

As ‘digital’ extends further into the realms of the healthcare industry, thanks to the rise of mobile products and the Internet of Things (IoT), it is no longer just consumer PCs, enterprise networks and government agencies that are targets for highly sophisticated cyber-attacks – it is medical devices too. With personally identifiable information (PII) of patients being the prize, hackers are increasingly honing their skills to get their hands on this valuable data. And unfortunately, they’re getting good at it […]

Categories : Data Security            Leave a comment           

In order to protect our data in the medium term the algorithms and protocols used must be resistant to developments in Quantum Computing that could result in many conventional public key algorithms becoming breakable – that is, reversible from the public key. As new algorithms and mechanisms are proposed how should they be safely included in systems without ultimately undermining security because of their immaturity? Several areas of mathematics are being considered as possibly resistant to quantum computer attacks. These […]

HIMSS 2017: Data Security Highlights

Posted By: Jim DeLorenzo
23 Feb
2017
Categories : Data Security            Leave a comment           

With our Healthcare Data Threat Report announced just this week, I was not surprised to see that one of our key findings aligned with the topics being discussed at the HIMSS conference. Based on my observations on the exhibit floor as well as my conversations with healthcare IT professionals and security consultants, one key theme from the report bears out: When it comes to protecting electronic personal health information (ePHI), the focus for many healthcare IT teams is still on […]