article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

They outlined why something called attribute-based encryption, or ABE, has emerged as the basis for a new form of agile cryptography that we will need in order to kick digital transformation into high gear. As we press ahead into our digital future, however, we’ll also need to retool the public-key-infrastructure.

article thumbnail

Protecting America’s Critical Infrastructure

Thales Cloud Protection & Licensing

Cyber defense should be part of every power grid’s digital transformation strategy–not only to ensure the power generation and reliability of the grid, but also to protect sensitive or private data. Best Practices to Secure Critical Infrastructure. All these measures are considered best practices for data protection.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches. With the global spend on digital transformation slated to reach a whopping $2.3

article thumbnail

How to Meet Phishing-Resistant MFA

Thales Cloud Protection & Licensing

CISA strongly urges system administrators and other high-value targeted users (attorneys, HR Staff, Top Management.) Highly targeted resources such as email systems, file servers, remote access systems must be protected with phishing -resistant authentication in priority.

Phishing 118
article thumbnail

Why Data Democratization? Why Now? What Does It Look Like?

erwin

When you’re looking for a definition of data democratization, you find a few common threads: making digital information accessible to the average user. opening up information systems to business users without requiring the involvement of IT personnel. Kind of a “Power to the People” meets “digital transformation” theme.

IT 52