Trusting in technology: the need for greater assurance in connected health

Trusting in technology: the need for greater assurance in connected health

| | Data Security
Whether offering instant access to patient records, allowing remote diagnosis of treatment, or giving access to lifestyle management and monitoring... The post Trusting in technology: the need for greater assurance in connected health appeared first on Data Security Blog | Thales e-Security ... Read More
Securing the digital human

Securing the digital human

| | Data Security
This blog was originally published on Business Reporter. To view the article, please click here. It is strange to think... The post Securing the digital human appeared first on Data Security Blog | Thales e-Security ... Read More

Whatever the future of payments, you can trust in a lack of trust

This blog was originally published on Business Reporter. To view the article, please click here. To see where the future... The post Whatever the future of payments, you can trust in a lack of trust appeared first on Data Security Blog | Thales e-Security ... Read More

Why the cybersecurity industry should care about Open Source maintenance

| | Data Security
In June of this year, Thales eSecurity joined the Core Infrastructure Initiative (CII), a project both founded and managed by... The post Why the cybersecurity industry should care about Open Source maintenance appeared first on Data Security Blog | Thales e-Security ... Read More

Why practical Blockchain must become a reality

| | Data Security
In just a few short years, Bitcoin, the innovative cryptocurrency underpinned by Blockchain technology, has earned broad legitimacy and won... The post Why practical Blockchain must become a reality appeared first on Data Security Blog | Thales e-Security ... Read More
Malware Meets the Bottom Line – Again

Malware Meets the Bottom Line – Again

| | Data Security
Maersk, the global shipping company and one impacted by June’s NotPetya malware, revealed last week the cyberattack could end up costing the company as much as 300 million dollars. While... The post Malware Meets the Bottom Line – Again appeared first on Data Security Blog | Thales e-Security ... Read More
Building Trust in Cloud Environments

Building Trust in Cloud Environments

| | Data Security
In this day and age, I feel almost embarrassed to write about cloud as though it’s somehow special or different, or even deserving of its special vaporous moniker. Cloud is... The post Building Trust in Cloud Environments appeared first on Data Security Blog | Thales e-Security ... Read More