Remove Engineering Remove Unstructured Data Remove Whitepaper
article thumbnail

Cybersecurity Awareness Month Blog Series: Using Technology to Safeguard the Nation’s Critical Infrastructure

Thales Cloud Protection & Licensing

Some of these include: Advanced persistent threats (APTs); Insider threats; Social engineering; and, Human error. If we focus primarily on perimeter defense, we will continue to see data breaches and exposure to our critical infrastructure.

article thumbnail

Why would a lawyer ever need an Information Security Professional?

CyberSecurity Insiders

An attorney will understand that data obfuscation will mask data, but may not know the different methods for doing so, or the best implementations for any given data set, such as structured versus unstructured data. Security Engineer. Security Analyst.