How to make sure your digital transformation is secure

How to make sure your digital transformation is secure

With more companies embracing digital transformation, how can they maintain a high level of cybersecurity while incorporating new technologies? We discuss in this blog ... Read More
Can good cybersecurity policies improve our quality of life?

Can good cybersecurity policies improve our quality of life?

Robust cybersecurity posture has become an essential part of our digital world, not only for its ability to protect us, but also to help us achieve a better quality of life ... Read More
Cloud Transformation are accelarating

Maintaining Data Security Integrity and Trust Infrastructure with Remote IT

| | Data Security
Companies of all sizes, from the largest public enterprise to the smallest private firm, are all susceptible to cyberattacks. Having... The post Maintaining Data Security Integrity and Trust Infrastructure with Remote IT appeared first on Data Security Blog | Thales eSecurity ... Read More

Securing Corporate Data When Remote Working is the Norm

| | Data Security
While many companies have deployed extra measures to secure employees’ remote access to corporate resources and apps, it is important... The post Securing Corporate Data When Remote Working is the Norm appeared first on Data Security Blog | Thales eSecurity ... Read More

RSAC 2020: The roaring 20s. A new decade brings new cybersecurity opportunities and challenges

| | Data Security
In a matter of a few days, security professionals from near and far will descend upon downtown San Francisco to... The post RSAC 2020: The roaring 20s. A new decade brings new cybersecurity opportunities and challenges appeared first on Data Security Blog | Thales eSecurity ... Read More

Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices

| | Data Security
In the spirit of National Cyber Security Awareness Month (NCSAM), my colleague Ashvin Kamaraju wrote about how organizations can use... The post Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices appeared first on Data Security Blog | Thales eSecurity ... Read More

Achieving Trust: Bake Security into Your Brand

| | Data Security
Data is the most valuable online currency a consumer possesses. Yet most people don’t trust the companies they’re sharing data... The post Achieving Trust: Bake Security into Your Brand appeared first on Data Security Blog | Thales eSecurity ... Read More

How to prepare for the California Consumer Privacy Act

| | Data Security
On June 28, 2018 the governor of California Jerry Brown signed into law with Assembly Bill No. 375 the California... The post How to prepare for the California Consumer Privacy Act appeared first on Data Security Blog | Thales eSecurity ... Read More

The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?

| | Data Security
Preparing for Data Security in the Quantum Computing Era Each passing day brings the world closer to the exciting reality... The post The Race is On! Crypto Agility vs Quantum Computing. Who is ahead? appeared first on Data Security Blog | Thales eSecurity ... Read More
March Madness and Distracted Employees – Bracket Busted

March Madness and Distracted Employees – Bracket Busted

| | Data Security
It’s March and with that comes the inevitable 70 million brackets to be completed predicting 67 basketball games over a... The post March Madness and Distracted Employees – Bracket Busted appeared first on Data Security Blog | Thales eSecurity ... Read More