Signed, Sealed, Delivered! Code Signing Makes Software Yours

Signed, Sealed, Delivered! Code Signing Makes Software Yours

| | Data Security
In “Signed, Sealed, Delivered,” Stevie Wonder sings “You’ve got the future in your hand — signed, sealed, delivered, I’m yours.”... The post Signed, Sealed, Delivered! Code Signing Makes Software Yours appeared first on Data Security Blog | Thales eSecurity ... Read More
To Make the Internet of Things Safe, Start with Manufacturing

To Make the Internet of Things Safe, Start with Manufacturing

Vincent Van Gogh is believed to have said “Great things are … done … by a series of small things... The post To Make the Internet of Things Safe, Start with Manufacturing appeared first on Data Security Blog | Thales eSecurity ... Read More
Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy

| | Data Security
This article was originally featured as a guest post on Venafi’s blog. Thales eSecurity and Venafi are technology partners. One... The post Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy appeared first on Data Security Blog | Thales eSecurity ... Read More
Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

| | Data Security
The Internet of Things (IoT) is very crowded. Connected devices outnumber people. The United Nations estimates the current world population... The post Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke appeared first on Data Security Blog | Thales e-Security ... Read More
Leopard Spots and Zebra Stripes: Big Data and Identity Management

Leopard Spots and Zebra Stripes: Big Data and Identity Management

| | Data Security
The expression “a leopard cannot change its spots” maintains that it is challenging to alter ones’ inherent nature — not... The post Leopard Spots and Zebra Stripes: Big Data and Identity Management appeared first on Data Security Blog | Thales e-Security ... Read More
It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe?

It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe?

| | Data Security
Data is increasingly amassed and harnessed to accelerate organizational transformation in the new digital economy. But because databases can hold... The post It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe? appeared first on Data Security Blog | Thales e-Security ... Read More
Trust, but Verify: Keeping Watch over Privileged Users

Trust, but Verify: Keeping Watch over Privileged Users

| | Data Security
“Trust but verify” is a Russian proverb President Reagan used as doctrine for nuclear disarmament between the U.S. and the... The post Trust, but Verify: Keeping Watch over Privileged Users appeared first on Data Security Blog | Thales e-Security ... Read More
Securing Containers for GDPR Compliance

Securing Containers for GDPR Compliance

Around the world, enterprises are anxious about May 25, 2018, the day enforcement begins for the European Union’s General Data... The post Securing Containers for GDPR Compliance appeared first on Data Security Blog | Thales e-Security ... Read More