article thumbnail

RSAC insights: Malware is now spreading via weaponized files circulating in data lakes, file shares

The Last Watchdog

However, there’s a third pillar of zero trust that hasn’t gotten quite as much attention: directly defending data itself, whether it be at the coding level or in business files circulating in a highly interconnected digital ecosystem. Votiro has established itself as a leading supplier of advanced technology to cleanse weaponized files.

article thumbnail

KMIP: The Cure for the Common Key Management Headache

Thales Cloud Protection & Licensing

came out in 2010. In addition, the DSM is starting to support a number of new business services as well. Following are a couple examples: Smart grids. For example, one service provider is using the DSM to handle keys in its emergency services applications. The first release of KMIP, version 1.0,