article thumbnail

4 smart technologies modernizing sourcing strategy

IBM Big Data Hub

In sourcing strategy, blockchain technology helps track orders, payments, accounts and more. Plus, blockchain transaction records are encrypted, making them incredibly difficult to hack or alter. How is sourcing strategy different than procurement strategy? Blockchain Information is an invaluable business asset.

article thumbnail

Increase security with customer-managed encryption

OpenText Information Management

When planning data encryption deployments, security and risk management leaders must develop an enterprise-wide encryption key management strategy to prevent data loss and other security risks. Build a more secure … The post Increase security with customer-managed encryption appeared first on OpenText Blogs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Let’s walk through some practical steps organizations can take today, implementing zero trust and remote access strategies to help reduce ransomware risks: •Obvious, but difficult – get end users to stop clicking unknown links and visiting random websites that they know little about, an educational challenge. Best practices.

Access 227
article thumbnail

How Encryption Became the Board’s New Best Friend

Thales Cloud Protection & Licensing

For many years, encryption has been viewed as a burden on businesses – expensive, complex and of questionable value. While 97% of IT experts indicated they are going through some type of digital transformation, only 30% have adopted an encryption strategy. Enter encryption. Originally published in TEISS on May 1, 2019.

article thumbnail

Is All Encryption Equal?

Thales Cloud Protection & Licensing

Data encryption has been around almost since the age of computers. In truth, anyone with minimal experience can write a simple script that uses default services built into virtually every OS to encrypt data. In Linux, for instance, it takes four openSSL commands to generate an encryption key and encrypt data.

article thumbnail

Dragon Breath APT uses double-dip DLL sideloading strategy

Security Affairs

The attack consists of a clean application, which acts as a malicious loader, and an encrypted payload. Sophos researchers observed an APT group, tracked as Dragon Breath (aka APT-Q-27 and Golden Eye), that is using a new DLL sideloading technique that adds complexity and layers to the execution of the classic DLL sideloading.

article thumbnail

Encryption trends and predictions over 50 years

Thales Cloud Protection & Licensing

Modern encryption can trace its root back to before WWII when Alan Turing built a modern computer in order to break the Enigma. Encryption went from being a technology predominantly used in highly classified, mission critical applications to a foundational component used in almost all aspects of our lives. So now what?