article thumbnail

How Encryption Became the Board’s New Best Friend

Thales Cloud Protection & Licensing

For many years, encryption has been viewed as a burden on businesses – expensive, complex and of questionable value. In recent years, we’ve seen a sharp rise in reporting and analysis of data breaches – arguably both a stimulant and a symptom of cyber-security taking its place on the board agenda. The digital transformation conundrum.

article thumbnail

GUEST ESSAY – A primer on ‘WAAP’ – an approach to securing APIs at the web app layer

The Last Watchdog

One could make the argument that Application Programming Interfaces — APIs – are a vital cornerstone of digital transformation. APIs interconnect the underlying components of modern digital services in a very flexible, open way. At this point, other aspects of security beyond the signature-based analysis become critical.

Security 255
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Deploying ‘machine learning’ at router level helps companies prepare for rise of 5G

The Last Watchdog

Machine learning (ML) and digital transformation (DX) go hand in glove. And as we accelerate the digitalization of everything, even more data is being generated. Analyzing encrypted traffic One area where Juniper is differentiating itself is in the area of encrypted traffic analysis.

article thumbnail

Multi-cloud use by healthcare providers puts patient data at risk

Thales Cloud Protection & Licensing

healthcare organizations are nearly universal in the adoption of digital transformation technologies (cloud, SaaS applications, big data, IoT, digital payments, containers, and blockchain). Encryption technologies are the top tools needed – and healthcare’s data encryption usage for critical systems is low.

Cloud 66
article thumbnail

Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing

Thales Cloud Protection & Licensing

New EU restrictions could force companies to change data transfer practices and adopt more advanced data encryption methods. The 2020 analysis found that customer data was by far the most-commonly compromised type of record with 80% of breached organizations saying that customer PII was affected. In the Dec. In the Dec.

article thumbnail

SHARING INTEL: Here’s why it has become so vital to prioritize the security-proofing of APIs

The Last Watchdog

The Peloton, Experian and Capital One hacks reflect the challenge of balancing security with the fast pace of digital transformation. Obviously, companies are going to have to come to grips with API exposures or digital transformation may come at too great a cost. Runtime vigilance.

IT 226
article thumbnail

Why 2018 Will Be the Trust Turning Point for the Digital Economy

Thales Cloud Protection & Licensing

This revolution in the creation, transfer, storage and analysis of data has produced our new digital economy. Its fundamental and transferrable value is fueling the digital transformation that organizations of all sizes, in all industries and around the world are undergoing.