Syndicated Blog

Enterprise Security – Gemalto blog
Conversations around digital security
Breaking the Silence about Privileged Access Management at Gartner IAM Summit

Breaking the Silence about Privileged Access Management at Gartner IAM Summit

Attackers who gain control of privileged accounts can have the key to the IT kingdom. They can take over enterprise IT, reset permissions, steal confidential for fraud, cause reputation damage, and introduce ...
#FIC2019 - Plénière 1 : Approche "By-design" : un concept à (ré)inventer

FIC 2019 – Protecting IS attacks starts with Secure Access Management

Nearly 10,000 people were present in Lille, in Northern France, on January 22 and 23 to participate in the FIC (International Cybersecurity Forum). This meeting brings together the main French and European ...
Cloud, On-Premises, or Hybrid – What Is the Best HSM Solution for You?

Cloud, On-Premises, or Hybrid – What Is the Best HSM Solution for You?

Not all HSMs are created equal. They have different levels of functionality, security, ease of use, etc. – all of which can have a knock-on effect on your TCO. Read on for ...
What is the Key Management Interoperability Protocol (KMIP) & the Benefit of a KMIP-Compliant Key Manager?

What is the Key Management Interoperability Protocol (KMIP) & the Benefit of a KMIP-Compliant Key Manager?

In today’s business world, the encryption of an organization’s sensitive data-at-rest must now be a fundamental component to any successful cyber security strategy. Whether the goal is compliance or securing data in ...
Demystifying the Indian Data Protection Bill, 2018:  Part 2 of 3

Demystifying the Indian Data Protection Bill, 2018: Part 2 of 3

In the second part of this three-part series, we delve further on the 10 key components that organisations need to keep in mind to adhere to the Indian Data Protection bill’s stringent ...
Nearly Half of Organizations Can’t Tell If Their IoT Devices Were Breached, Finds Study

Nearly Half of Organizations Can’t Tell If Their IoT Devices Were Breached, Finds Study

The Internet of Things (IoT) is on the rise. According to Statista, the number of IoT devices are expected to increase from 23.14 billion to 30.73 billion in 2020. By 2025, that ...
Gemalto’s Cipher Partner Program Certifications Get a Refresh

Gemalto’s Cipher Partner Program Certifications Get a Refresh

As the security market continues to grow rapidly, the opportunity for Gemalto partners to expand their sales efforts continues to ripen. We’ve heard time and again in our annual Voice of the ...
The Future of Cybersecurity – A 2019 Outlook

The Future of Cybersecurity – A 2019 Outlook

From the record-breaking number of data breaches to the implementation of the General Data Protection Regulation (GDPR), 2018 will certainly go down as a memorable year for the cybersecurity industry. And there ...
Demystifying the India Data Protection Bill, 2018: Part 1 of 3

Demystifying the India Data Protection Bill, 2018: Part 1 of 3

The ‘Personal Data Protection Bill, 2018’ was built on the edifice that ‘Right To Privacy’ is a fundamental right of Indian citizens, the Personal Data Protection Bill, 2018 is expected to completely ...
Loading...