PII Microsoft Koverse data protection impact assessment DPIA Dell AWS data protection cybersecurity

The Security Imperative: Data Protection

As cyberthreats to supply chain, infrastructure and operational technology (OT)—not to mention rogue activity sponsored by nation-states—continue to increase, there is one constant: Good data protection has never been more critical. Successful ...
Security Boulevard
RagnarLocker PKIaaS certificate key management PKI SSH key

Overcoming the Challenges of Enterprise Key Management

Let’s face it: Encryption key management can seem daunting. Sure, it’s easy to connect a hardware security module (HSM) to a database and generate a key, but that’s not how it works ...
Security Boulevard
encryption enterprise encryption

Enterprise Data Encryption Use Reaches Historic Highs

For decades, enterprise data encryption and effective key management were something most enterprises wanted to do but couldn’t — if they tried to do it at all. Only the largest of enterprises ...
Security Boulevard
RagnarLocker PKIaaS certificate key management PKI SSH key

Securing SSH Keys in Multicloud Operations

Secure Shell, or SSH, keys have become a go-to authentication tool, especially as we continue to adopt and adapt to distributed IT and remote working environments that demand robust access controls. But ...
Security Boulevard
encryption

White-Box Encryption: Ending Web App Vulnerability

Key management must give way to new options that enable and protect true encryption for organizations For as long as they’ve existed, web applications have been a favorite target for hackers. They ...
Security Boulevard

Modernizing Your PKI Infrastructure | Keyfactor 

Over the years, the definition, functionality, and team required to operate a modern PKI infrastructure has drastically changed ...

1 Billion Reasons to Manage Cryptographic Keys | Keyfactor

Postbank, the banking division of South Africa’s Pat Office, recently reported that a rogue employee had stolen the 36-digit master keys used to protect the banks systems. The result: 25,000 fraudulent charges ...
Graphic representing encryption keys that need to be managed to improve security

12 Enterprise Encryption Key Management Best Practices

From centralization to automation, here’s your 12-step guide to being more proactive with your enterprise’s encryption key management “What’s the first thing I need to protect data stored on our... The post ...
Understanding Key Management Policy – Part 2

Understanding Key Management Policy – Part 2

In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with ...
Thales Cloud Protection and Licensing Intro Video

A New Leader in Data Protection

It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital security, protecting more data, transactions and identities than any ...