article thumbnail

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud

Thales Cloud Protection & Licensing

The Cloud Trust Paradox: Keeping Control of Data & Encryption Keys in the Cloud. Trust is a much-debated topic in cloud security. However, there seems to be a cloud trust paradox: to trust more, you will need to trust less. The less a cloud provider knows or holds about you and your data, the more you trust them.

article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Biomedical engineer Dr. Joe Alexander, the former medical director at pharmaceutical giant Pfizer, grabbed a distinguished scientist post, as well. Digital commerce exists in the form we have it today because of the Public Key Infrastructure, or PKI , our system for encrypting data and certifying its authenticity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Counting Down to the EU NIS2 Directive

Thales Cloud Protection & Licensing

NIS2 adds digital service providers, waste management, pharmaceutical and labs, space, and public administration to the ‘Essential’ sectors category. Cryptography and encryption. Application Security : Protect applications and APIs at scale in the cloud, on-premises, or hybrid models. Business continuity/crisis management.

article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Our top math geniuses point to iO as a cornerstone needed to unleash the full potential of artificially intelligent (AI) programs running across highly complex and dynamic cloud platforms, soon to be powered by quantum computers. Sending your program out to an untrusted cloud to be executed raises the stakes even more,” Sahai observes.

article thumbnail

NEW TECH: How Semperis came to close a huge gap in Active Directory disaster preparedness

The Last Watchdog

But then came a wave of ransomware attacks like WannaCry and cyber weapons like NotPetya, the ransomware spreading worm that encrypted AD, locking out company control — permanently, without a distinction as to whether its extortion demands went unmet or not. Whoever was behind NotPetya leveraged cyber weapons stolen from the NSA. “If

article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

A DSP is an information society service that is an online marketplace, an online search engine or a cloud computing service. The deployment models of cloud computing should include private, community, public and hybrid cloud and be interpreted in accordance with the ISO/IEC 17788:2014 standard.

article thumbnail

The Applications of Blockchain in Data Management

AIIM

Along with cloud computing, artificial intelligence (AI), and robotic process automation (RPA), blockchain is transforming business operations and challenging traditional methods the world over. Security methods, such as encryption, are useful in the fight against data breaches, but they cannot offer complete protection.