article thumbnail

Streamlining supply chain management: Strategies for the future

IBM Big Data Hub

To mitigate these risks , companies need the resources and technology to develop robust contingency plans. Fewer disruptions : A healthy supply chain mitigates risks and protects against inevitable disruption. Automation Automation can streamline supply chain operations, from order fulfillment to inventory tracking.

article thumbnail

Emerging security challenges for Europe’s emerging technologies

Thales Cloud Protection & Licensing

The vast majority (84%) of enterprises are now using, or planning to use, digitally transformative technologies – such as big data, containers, blockchain and the Internet of Things (IoT). Blockchain. So how do these technologies stack up from a security standpoint? Overall, these track closely to the global sample. Containers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Financial Services Data – More at risk than you’d believe

Thales Cloud Protection & Licensing

With digital transformation technologies like cloud, big data, IoT, containers, mobile payments and blockchain all in play, there are many new attack surfaces and risks to financial data. The post Financial Services Data – More at risk than you’d believe appeared first on Data Security Blog | Thales eSecurity.

article thumbnail

Cybersecurity Mesh, Decentralized Identity Lead Emerging Security Technology: Gartner

eSecurity Planet

New cybersecurity buzzwords are always in abundance at the Gartner Security & Risk Management Summit, and the concepts that took center stage this week, like cybersecurity mesh and decentralized identity, seem well suited for new threats that have exploded onto the scene in the last year. Where Security Buyers Are At.

article thumbnail

Gartner Security & Risk Management Summit 2018 Trip Report

Thales Cloud Protection & Licensing

called Gartner Security & Risk Management Summit. This event is focused on the needs of senior IT and security professionals, such as CISOs, chief risk officers, architects, IAM and network security leaders. They looked at “risk” through analogies, and spoke about what can be controlled and what can’t.

Risk 59
article thumbnail

Multi-cloud use by healthcare providers puts patient data at risk

Thales Cloud Protection & Licensing

healthcare organizations are nearly universal in the adoption of digital transformation technologies (cloud, SaaS applications, big data, IoT, digital payments, containers, and blockchain). The post Multi-cloud use by healthcare providers puts patient data at risk appeared first on Data Security Blog | Thales eSecurity.

Cloud 66
article thumbnail

Cybersecurity Outlook 2022: Third-party, Ransomware and AI Attacks Will Get Worse

eSecurity Planet

Third-party Risks Take Center Stage. Third-party risks are at the forefront of security concerns, with identity risk management provider SecZetta predicting that “supply chain paranoia” will take over the cybersecurity world this year. Also read: Best Third-Party Risk Management (TPRM) Tools for 2022. .”