Remove 2019 Remove Digital transformation Remove IoT
article thumbnail

SHARING INTEL: Why full ‘digital transformation’ requires locking down ‘machine identities’

The Last Watchdog

This is so in spite of the fact that machine identities are exploding in numbers and have come to saturate digital transformation. Related: IoT exposures explained I’ve conversed several times with Jeff Hudson about this. We had a chance to meet again at Black Hat 2019.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches. With the global spend on digital transformation slated to reach a whopping $2.3 To Sum It Up.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Necessity of Data Security: Recapping the 2019 Thales Data Security Summit

Thales Cloud Protection & Licensing

Digital transformation is driving IT modernization, IoT, and cloud migrations at a record pace in the federal government. The ability to narrow the gap between taking advantage of digital transformation without compromising security was a reoccurring theme at our 2019 annual Data Security Summit on May 1.

article thumbnail

Making the Case for Encryption in the Era of Digital Transformation – Highlights from our Annual Data Threat Report

Thales Cloud Protection & Licensing

Now in its sixth year, the report is squarely focused on digital transformation and what that means for organizations and their data security. When it comes to digital transformation, organizations are rushing to meet the demand, by leadership or customers, to deploy transformative technologies as a competitive edge.

article thumbnail

Q&A: Why emerging IoT platforms require the same leading-edge security as industrial controls

The Last Watchdog

In 2019, and moving ahead, look for legacy IT business networks to increasingly intersect with a new class of networks dedicated to controlling the operations of a IoT-enabled services of all types, including smart buildings, IoT-enabled healthcare services and driverless cars.

IoT 174
article thumbnail

RSAC 2019 Blog Series: Taking the Risk out of Digital Transformation: RSAC 2019’s Quest for Delivering “Better”

Thales Cloud Protection & Licensing

However, in an attempt to be “better” many organizations have leaned heavily on emerging technologies such as cloud, blockchain and IoT – aka digital transformation. However, as digital transformation proves “better” for many aspects, it isn’t proving to be better for security.

article thumbnail

European Businesses Signal ‘Growing Security Gap’ Amid Mass Digital Transformation

Thales Cloud Protection & Licensing

As false predictions of digital transformation fade into the past, we are hurtling into a new era of business. Upwards of 84% of enterprises are using, or planning to use, digitally transformative technologies such as cloud, big data, containers, blockchain and the Internet of Things (IoT).