Seven Microservices Identity Questions to Secure your Data

Seven Microservices Identity Questions to Secure your Data

| | Data Security
As I noted in my last blog post, containers, which are now pervasive in enterprises, are ephemeral, and microservices frameworks... The post Seven Microservices Identity Questions to Secure your Data appeared first on Data Security Blog | Thales eSecurity ... Read More
RSA 2019 Blog Series: Securing Microservices

RSA 2019 Blog Series: Securing Microservices

| | Data Security
Every once in a while, a new transformative architecture emerges, which challenges how we think about applications and our understanding... The post RSA 2019 Blog Series: Securing Microservices appeared first on Data Security Blog | Thales eSecurity ... Read More
The Standards Race of the Future is On

The Standards Race of the Future is On

| | Data Security
The National Institute of Standards and Technology (NIST)’s Post-Quantum Cryptography Standardization project second round candidates have just been announced, a... The post The Standards Race of the Future is On appeared first on Data Security Blog | Thales eSecurity ... Read More
Is the Department of Homeland Security’s cybersecurity strategy up to the task?

Is the Department of Homeland Security’s cybersecurity strategy up to the task?

| | government
On May 16, the Department of Homeland Security (DHS) released a new cybersecurity strategy to keep pace with the evolving... The post Is the Department of Homeland Security’s cybersecurity strategy up to the task? appeared first on Data Security Blog | Thales eSecurity ... Read More
AI/ML and Digital Security

AI/ML and Digital Security

Sixty-four percent of the more than 1,200 senior security executives from around the world, whom we surveyed for the 2018... The post AI/ML and Digital Security appeared first on Data Security Blog | Thales e-Security ... Read More

Three Strategies for Big Data Security

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. We surveyed more than... The post Three Strategies for Big Data Security appeared first on Data Security Blog | Thales e-Security ... Read More