Remove Analysis Remove Blockchain Remove Encryption Remove Government
article thumbnail

FRANCE: CNIL publishes initial analysis on Blockchain and GDPR

DLA Piper Privacy Matters

The French Data Protection Supervisory Authority (the CNIL) has recently published its initial thoughts on this topic, providing some responses and practical recommendations on how the usage of a blockchain may be compatible with GDPR and more generally Data Protection Law, taking into account the “constraints” imposed by such technology. .

article thumbnail

Multi-cloud use by healthcare providers puts patient data at risk

Thales Cloud Protection & Licensing

As a result of government mandates, the need for greater efficiency, and the desire to enable better patient care, U.S. healthcare organizations are nearly universal in the adoption of digital transformation technologies (cloud, SaaS applications, big data, IoT, digital payments, containers, and blockchain).

Cloud 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Applications of Blockchain in Data Management

AIIM

Blockchain is one of the most important new technologies that has impacted the business world in the last decade. Along with cloud computing, artificial intelligence (AI), and robotic process automation (RPA), blockchain is transforming business operations and challenging traditional methods the world over. Data Security.

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Cryptocurrency is a digital currency designed to work as a medium of monetary exchange through transactions on a computer network and is not reliant on any central authority, such as a government or bank, to uphold or maintain it. Vranken: Well, the blockchain aspect makes everything immutable. What’s that?

article thumbnail

Protecting Against the Risks and Managing the Complexities of a Quantum World with Thales and IBM Consulting

Thales Cloud Protection & Licensing

Threats to cryptography are generally prevented by using common cybersecurity hygiene practices defined in clear and achievable governance. As quantum computing continues to advance, the threat it poses to traditional encryption methods is clear. to initiate malicious transactions on long term blockchains or distributed ledgers.

Risk 87
article thumbnail

What Is Hybrid Cloud Security? How it Works & Best Practices

eSecurity Planet

Encryption protects data both in transit and at rest. Encryption: Encrypting data and cloaking it in a secure, unreadable format both during transit (through protocols such as SSL/TLS) and at rest prevents unwanted access. Role-based access control (RBAC) and multi-factor authentication ( MFA ) regulate resource access.

Cloud 105
article thumbnail

Regulatory Update: NAIC Spring 2019 National Meeting

Data Matters

NAIC Continues to Consider the Use of Big Data and Blockchain Technology in the Insurance Industry. The NAIC is continuing to consider the use of (a) big data for predictive modeling in rate filings by property and casualty insurers and (b) blockchain technology in the insurance industry.