Category: Data Security

Categories : Data Security            Leave a comment           

Towards the end of 2016, Thales e-Security, in conjunction with 451 Research, conducted a comprehensive global survey of security professionals to get a pulse on the state of the security industry’s level of preparedness to deal with threats to data, both from insiders as well as external threat actors. The results of that study included a Global Threat Report, as well as several regional and vertically-focused reports including one focused on the federal government sector. One of the new aspects […]

Categories : Data Security            Leave a comment           

By Adrian Lane, (guest author) This blog first appeared on Securosis (https://securosis.com/blog/multi-cloud-key-management-deployment-options) This post will discuss how to deploy encryption keys into a third-party cloud service. We illustrate the deployment options, along with the components of a solution. We will then walk through the process of getting a key from your on-premise Hardware Security Module (HSM) into a cloud HSM. We will discuss variations on using cloud-based HSM for all encryption operations, as well as cases where you instead delegate […]

Encryption Everywhere

Posted By: John Grimm
20 Apr
2017
Categories : Data Security            Leave a comment           

There’s something satisfying about having empirical evidence confirm what you see every day. This year’s Global Encryption Trends Study reveals that encryption has come a long way since the days when it was governments and banks that cared most about it. Today, encryption is a core element of the data security strategy for all types of organizations, and the results of this year’s survey bear that out. Encryption – with a sound key management approach underpinning it – can protect […]

Why your business is missing a trick by failing to prepare for the GDPR

Posted By: Peter Carlisle J, Thales e-Security
19 Apr
2017
Categories : Data Security            Leave a comment           

Brexit has certainly raised many questions with business leaders, but none more so than around the impending EU General Data Protection Regulation (GDPR). In fact, I recently read that one in four businesses have cancelled all preparations for the GDPR as they mistakenly believe the rules will no longer apply in the wake of the triggering of Article 50 last month. What’s more, and perhaps even more worryingly, nearly half (48%) have not even begun to prepare for the changing […]

Encryption becomes a boardroom matter

Posted By: Cindy, Thales e-Security
13 Apr
2017
Categories : Data Security            Leave a comment           

When it comes to matters of encryption, you wouldn’t be alone in thinking they reside solely within the confines of an organization’s IT team. In fact, for the past 12 years, our Global Encryption Trends Reports have shown that the IT operations function has consistently been the most influential in framing an organization’s encryption strategy. However, findings from our most Global Encryption Trends Report show that the balance of power has shifted. Boardroom backing For the first time in the […]

All ‘Go’ for Thales’s Open Source project

Posted By: Richard Kettlewell
12 Apr
2017
Categories : Data Security            Leave a comment           

Thales has recently embarked on its first fully Open Source project, enabling organisations using cloud-related tools to leverage our hardware security modules (HSMs) for protection. Platforms such as Docker are used to, very rapidly, bring up applications and services in a cloud environment, a process which partly relies on securely delivering the code for these applications and services into newly created virtual machines or cloud environments. Currently, this is done using what is, essentially, a pure software signature system. This, […]

11 Apr
2017
Categories : Data Security            Leave a comment           

By Adrian Lane (https://securosis.com/blog/author-posts/239) (guest author) This blog first appeared on Securosis (https://securosis.com/blog/multi-cloud-key-management-new-series) Running IT systems atop public cloud services is a reality for most companies. Just about every company uses Software-as-a-Service to some degree, with many having already migrated back office systems like email, collaboration, file storage and customer relationship management software. But now we are also witnessing the core of the data center – financial systems, databases, supply chain and enterprise resource planning software – moved to public […]

The Evolution of Encryption

Posted By: Alan Kessler, @kessalan
04 Apr
2017
Categories : Data Security            Leave a comment           

The roots of encryption go deep into human history. Encryption has been used for centuries to encode messages, usually to keep government secrets, but also to protect business or trade secrets such as the formula to make silk or pottery. Early encryption was fairly simplistic, largely relying on paper and pencil techniques like steganography, transposition and substitution. In the last century, encryption methods have advanced at a rapid clip, first by leveraging automation and the use of machinery and then […]

04 Apr
2017
Categories : Data Security            Leave a comment           

On April 3, 1973, Motorola employee Martin Cooper made the first mobile phone call. Cooper used the opportunity to call Joel Engel, a competitor at AT&T, to tell him he had an operational mobile phone. Without knowing it, Cooper set events into motion that would change the world forever. Since the time of Cooper’s first call, there has been an explosion of innovation in mobile technologies. One of the most significant innovations came on Jan. 9, 2007 when Apple announced […]

Categories : Data Security            Leave a comment           

The first payments and data event in the UK, Unlocking the Power of Data: The future of smarter payments provided a wealth of new thinking and insight. It explored how trusted third parties could offer consumers a much broader and innovative range of payment and account information services than they have today through their high street bank. You may be surprised to hear that all of this is being actively encouraged by HM Treasury and the financial regulator who were […]