Signed, Sealed, Delivered! Code Signing Makes Software Yours
In “Signed, Sealed, Delivered,” Stevie Wonder sings “You’ve got the future in your hand — signed, sealed, delivered, I’m yours.”... The post Signed, Sealed, Delivered! Code Signing Makes Software Yours appeared first on Data Security Blog | Thales eSecurity ... Read More
To Make the Internet of Things Safe, Start with Manufacturing
Vincent Van Gogh is believed to have said “Great things are … done … by a series of small things... The post To Make the Internet of Things Safe, Start with Manufacturing appeared first on Data Security Blog | Thales eSecurity ... Read More
Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy
This article was originally featured as a guest post on Venafi’s blog. Thales eSecurity and Venafi are technology partners. One... The post Three Reasons You Should Treat Applications as Machine Identities in Your Security Strategy appeared first on Data Security Blog | Thales eSecurity ... Read More
Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke
The Internet of Things (IoT) is very crowded. Connected devices outnumber people. The United Nations estimates the current world population... The post Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke appeared first on Data Security Blog | Thales e-Security ... Read More
Leopard Spots and Zebra Stripes: Big Data and Identity Management
The expression “a leopard cannot change its spots” maintains that it is challenging to alter ones’ inherent nature — not... The post Leopard Spots and Zebra Stripes: Big Data and Identity Management appeared first on Data Security Blog | Thales e-Security ... Read More
It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe?
Data is increasingly amassed and harnessed to accelerate organizational transformation in the new digital economy. But because databases can hold... The post It’s Eleven O’Clock. Do You Know If Your Organizational Data Is Safe? appeared first on Data Security Blog | Thales e-Security ... Read More
Trust, but Verify: Keeping Watch over Privileged Users
“Trust but verify” is a Russian proverb President Reagan used as doctrine for nuclear disarmament between the U.S. and the... The post Trust, but Verify: Keeping Watch over Privileged Users appeared first on Data Security Blog | Thales e-Security ... Read More
Securing Containers for GDPR Compliance
Around the world, enterprises are anxious about May 25, 2018, the day enforcement begins for the European Union’s General Data... The post Securing Containers for GDPR Compliance appeared first on Data Security Blog | Thales e-Security ... Read More

