Remove Case Study Remove Communications Remove Encryption Remove GDPR
article thumbnail

Monsido Meets Digital Sovereignty Requirements with Cloud Key Management

Thales Cloud Protection & Licensing

Many countries and regions have implemented strict data protection laws, such as the European Union's General Data Protection Regulation (GDPR), requiring organizations to adhere to specific data protection standards. The Monsido tool operates entirely on the Google Cloud Platform.

Cloud 71
article thumbnail

What is the NIS2 Directive and How Does It Affect You?

Thales Cloud Protection & Licensing

The use of cryptography and encryption. NIS2 Technical and Organisational Measures Focus Area Case Study. the use of cryptography and encryption” [Article 18(2g)]. Why Cryptography and Encryption? Business continuity and crisis management. Supply chain security. Security in network and information systems.

IT 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

The latest evolution of digital technologies, such as robotics, Internet of Things, Artificial Intelligence, high-performance computers and powerful communication networks leads self-driving cars out of an imaginary world and into our daily lives. 23(1) GDPR. 23(1) GDPR. Risks identified by the European Data Protection Board.

Privacy 69
article thumbnail

RSA Conference 2023: Meet Thales Where the World Talks Security!

Thales Cloud Protection & Licensing

Be in control of your encryption keys and their location, and how to control access to your sensitive data and digital services to comply with emerging data sovereignty requirements. Data Security Chad Couser | Director Marketing Communications Thales More About This Author > Schema We look forward to seeing you!

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

This framework guarantees that appropriate authentication measures, encryption techniques, data retention policies, and backup procedures are in place. Is data encrypted in transit and at rest? Are you in compliance with the General Data Protection Regulation (GDPR) for the collection and processing of EU member data?

Security 108