Ved Prakash, Author at Security Boulevard
Data Encryption Table

Data Protection in the Digital Transformation Era

| | Data Security
With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become... The post Data Protection in the Digital Transformation Era appeared first on Data Security Blog | Thales eSecurity ... Read More
Rethink Your Enterprise Data Protection Strategy

Rethink Your Enterprise Data Protection Strategy

In our latest blog, we rethink the data protection strategy across organizations and shift the focus from securing the network to securing the data itself – wherever it resides. Read on for 4 prerequisites to developing a cohesive enterprise data protection strategy ... Read More
Everything You Need To Know About The Aadhaar Data Vault

Everything You Need To Know About The Aadhaar Data Vault

Learn everything you need to know about the Aadhaar Data Vault, including what it is, how it works, important aspects to be considered while developing an Aadhaar Data Vault, and how Thales can help ... Read More
Unmasking Data Masking

Unmasking Data Masking

Business organisations today are handling massive volumes of data at various levels in their operation. With digitization being implemented on a huge scale, data breach is now among the primary concerns that business entities are either facing or fearing. In this blog post, we will touch upon data masking - ... Read More
Understanding Key Management Policy – Part 2

Understanding Key Management Policy – Part 2

In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with cybercriminals getting more sophisticated, merely encrypting data is not sufficient ... Read More
Understanding Key Management Policy – Part 1

Understanding Key Management Policy – Part 1

In this two-part blog series, we will deep dive into the concept of (encryption) key management and cover the pivotal role a well-defined Key Management Policy (KMP) plays in data protection ... Read More
Demystifying the India Data Protection Bill, 2018: Part 3 of 3

Demystifying the India Data Protection Bill, 2018: Part 3 of 3

In this third and final part of the three-part blog series on the upcoming India Data Protection Bill, we will cover 4 key technologies that play a pivotal role in protecting data — both at rest and in motion and 3 important steps that organisations need to take to adhere ... Read More
Demystifying the Indian Data Protection Bill, 2018:  Part 2 of 3

Demystifying the Indian Data Protection Bill, 2018: Part 2 of 3

In the second part of this three-part series, we delve further on the 10 key components that organisations need to keep in mind to adhere to the Indian Data Protection bill’s stringent compliance guidelines ... Read More
Demystifying the India Data Protection Bill, 2018: Part 1 of 3

Demystifying the India Data Protection Bill, 2018: Part 1 of 3

The ‘Personal Data Protection Bill, 2018’ was built on the edifice that ‘Right To Privacy’ is a fundamental right of Indian citizens, the Personal Data Protection Bill, 2018 is expected to completely transform the way organisations collect, store, share and process the personal data of Indian citizens. Learn more about ... Read More
Blockchain Security: 3 Ways to Secure Your Blockchain

Blockchain Security: 3 Ways to Secure Your Blockchain

From just another buzzword a few years back, to one of the most pursued technologies across the globe, Blockchain has come a long way. Improved data security, faster transactions and cost savings are some of the many reasons that make Blockchain so attractive. Within this blog, learn three ways to ... Read More