Remove Blog Remove Encryption Remove Military Remove Mining
article thumbnail

Ethical Hackers: A Business’s Best Friend?

Thales Cloud Protection & Licensing

encryption, two-factor authentication and key management) to protect their data from hackers. The four key methods of an ethical hacker include: Monitoring: They’ll monitor a company to understand the data it creates and stores and where any sensitive data is — the gold mine hackers are after.

Cloud 91
article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

Originally Featured in Global Military Communications Magazine’s June/July Issue. Over two-thirds (72 percent) of respondents expressed concerns about increased vulnerabilities from shared infrastructures, followed by custodianship of encryption keys (62 percent) and security breaches in the cloud (68 percent).

article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

For more information on each story, simply follow the links in the transcript on our blog. that the crooks were only able to mine a paltry $24 – which Coinhive refused to pay out anyway. It also announced in the same blog that it would be shutting down the consumer version of Google+ by next August. million account holders.