Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

| | Data Security
The Internet of Things (IoT) is very crowded. Connected devices outnumber people. The United Nations estimates the current world population... The post Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke appeared first on Data Security Blog | Thales e-Security ... Read More
Leopard Spots and Zebra Stripes: Big Data and Identity Management

Leopard Spots and Zebra Stripes: Big Data and Identity Management

| | Data Security
The expression “a leopard cannot change its spots” maintains that it is challenging to alter ones’ inherent nature — not... The post Leopard Spots and Zebra Stripes: Big Data and Identity Management appeared first on Data Security Blog | Thales e-Security ... Read More
It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe?

It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe?

| | Data Security
Data is increasingly amassed and harnessed to accelerate organizational transformation in the new digital economy. But because databases can hold... The post It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe? appeared first on Data Security Blog | Thales e-Security ... Read More
Trust, but Verify: Keeping Watch over Privileged Users

Trust, but Verify: Keeping Watch over Privileged Users

| | Data Security
“Trust but verify” is a Russian proverb President Reagan used as doctrine for nuclear disarmament between the U.S. and the... The post Trust, but Verify: Keeping Watch over Privileged Users appeared first on Data Security Blog | Thales e-Security ... Read More
Securing Containers for GDPR Compliance

Securing Containers for GDPR Compliance

Around the world, enterprises are anxious about May 25, 2018, the day enforcement begins for the European Union’s General Data... The post Securing Containers for GDPR Compliance appeared first on Data Security Blog | Thales e-Security ... Read More