Security in the Multi-Cloud Era

Posted By: C.J Radford
28 Mar
2017
Categories : Data Security            Leave a comment           

As organizations are deciding where best to run their applications and store their data, many are debating whether to work with a single cloud service provider (CSP), or to work with two or more. According to IDC’s Worldwide Cloud 2017 Predictions, by the end of 2018, over half of enterprise-class businesses will subscribe to more than five different public cloud services. ESG research also shows that 75% of current public cloud infrastructure customers use multiple CSPs. Let me be the […]

Categories : Data Security            Leave a comment           

A recent report from Deloitte has revealed that only a third of British consumers would be interested in owning a driverless car. The report indicates a preference for safety rather than self-driving features, which comes as no real surprise. As self-driving technology is increasingly pushed up the agenda for automakers, the industry as a whole must demonstrate a clear commitment to vehicle safety above all else. Consumers have every right to be concerned about the risks of hacking and the […]

What is blockchain?

Posted By: Jose Diaz
23 Mar
2017
Categories : Data Security            Leave a comment           

Before I answer the question in the headline – What is blockchain? – let me back up and remind you why you’ve heard of blockchain. Bitcoin Bitcoin calls itself “an innovative payment network and new kind of money.” It can also call itself a media darling. Bitcoin has a way of getting into headlines on a regular basis. President Trump’s Office of Management and Budget Director Mick Mulvaney is a bitcoin proponent. Members of the U.S. Congress – from both […]

EU Regulators Take Another Step Forward with eIDAS Standards

Posted By: Kristina Cairns, @kcairns2020 (Twitter)
20 Mar
2017
Categories : Data Security            Leave a comment           

A new protection profile has been introduced, giving manufacturers a standard by which to certify Hardware Security Modules (HSMs). The new protection profile, which is expected to be accepted under eIDAS (EU regulation 910/2014), provides a common EU standard for HSMs. Thales e-Security HSMs that are certified to this standard will meet EU governmental requirements for HSM procurement across the whole of the EU, where in many cases the American FIPS 140 standard has not been acceptable. ANSSI, the French […]

Using Cloud, IoT, Big Data and Containers Sensitive Data – Without Data Security

Posted By: Andy Kicklighter, @akicklighter (Twitter)
16 Mar
2017
Categories : Data Security            Leave a comment           

Releasing today is our 2017 Thales Data Threat Report – Advanced Technology Edition.  In this edition of the report, we extend the findings from our “Global” edition with the details of how enterprises are adopting and using Cloud, Big Data, IoT and Containers (like Docker) with an emphasis on their use of sensitive data within these environments. Click to Tweet: 93% using #Cloud#IoT#BigData #Containers without Data Security #2017DataThreat bit.ly/2mCQgMY pic.twitter.com/5xueeNA2jr The top finding from the report?  The way that many […]

Proactively protecting the public sector

Posted By: Louise Bulman, AVP of EMEA | Vormetric, A Thales Company
14 Mar
2017
Categories : Data Security            Leave a comment           

Initiatives to digitally transform the UK government are happening across the board. The NHS, for example, is preparing to become paperless by 2020 and Her Majesty’s Revenue and Customs (HMRC) has been granted £1.3 billion in funding to initiate digital transformation. Meanwhile, the Department for Work and Pensions is investing heavily in big data technologies to drive automation, identify errors and tackle fraud. Yet, while these innovative programmes undoubtedly have their benefits, they do unfortunately make the government an increasingly […]

Categories : Data Security            Leave a comment           

Our recent blog (UK Government PKI) reflected on enterprise cryptographic products being used successfully to protect UK Government IT Systems, with a particular focus on public key infrastructures. Indeed, the application of hardware security modules (HSMs) to protect keys in a certified hardware environment is now broadening to support the demand for higher assurance security in other areas of IT. For example, cloud service providers are now embedding HSMs into their data centres to allow organisations to take advantage of […]

10 Years of Technology Advances: Who Were the Winners?

Posted By: Alan Kessler, @kessalan
07 Mar
2017
Categories : Data Security            Leave a comment           

If you can believe it, it’s been 10 years since Steve Jobs introduced the first iPhone. It was sold only by Cingular Wireless (AT&T), and used GPRS and EDGE for data transfer. Needless to say, much has changed since then. And mobile computing isn’t the only technology that has captured attention and taken hold in the enterprise. As we look at how recent technology advancements have impacted the industry, we should also note that it has greatly affected every organization’s […]

Apprentices are critical to keeping critical infrastructure safe

Posted By: Peter Carlisle J, Thales e-Security
06 Mar
2017
Categories : Data Security            Leave a comment           

Earlier this year, it was reported that Britain is worryingly ‘highly vulnerable’ to a powerful cyber-attack. One of the main factors behind statement? A shortage in skilled security staff. As cyber-criminals become more targeted, and successful, in their efforts to hack organisations across all industries, the number of cyber security job vacancies in Britain has indeed risen by 30 percent between 2014 and 2016. However, candidate numbers are failing to keep pace. In fact, a study from the Centre for […]

Categories : Data Security            Leave a comment           

You can read every review about a car, but you won’t begin to appreciate it until you go to a dealer and drive it. So it goes with nearly any product. For information technology buyers, it’s a big challenge: IT product vendors layer additional capabilities and features on core products. You read about them on data sheets, watch demonstration videos, even start to touch products at trade show demos (often with a member of staff standing a bit too close). […]