article thumbnail

2018 Thales Data Threat Report, Global Edition: Digital Transformation & Data Security

Thales Cloud Protection & Licensing

The twin drivers of the problem are increased threats and the drive to digitally transform how organizations deliver value and revenue. This year’s report documents these twin drivers, what organizations are doing about the problems and best practice recommendations for how IT security stances should change to meet both needs.

article thumbnail

Cactus ransomware gang claims the Schneider Electric hack

Security Affairs

Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation. In early January, the Cactus ransomware group claimed to have hacked Coop, one of the largest retail and grocery providers in Sweden.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric

Security Affairs

Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation. In early January, the Cactus ransomware group claimed to have hacked Coop, one of the largest retail and grocery providers in Sweden.

article thumbnail

MY TAKE: Agile cryptography is coming, now that ‘attribute-based encryption’ is ready for prime time

The Last Watchdog

Encryption agility is going to be essential as we move forward with digital transformation. I had the chance to learn more about ABE from Brent Waters, a distinguished scientist in the Cryptography & Information Security (CIS) Lab at NTT Research. Refer: The vital role of basic research.

article thumbnail

Record Retention Policy for Businesses: A Strategic Guide to Compliance and Efficiency

Armstrong Archives

No matter the size of a business, a well-defined record retention policy serves multiple purposes: ensuring compliance with legal and regulatory requirements, aiding in efficient document management, and securing sensitive information. Also, their policies must be tailored to their specific industry requirements and business size.

article thumbnail

Sailing the cyber security waves

IT Governance

Ships have experienced a digital transformation in recent years. They should also consider implementing an ISO 27001 ISMS (information security management system) to ensure that information security is managed in line with international best practice and business objectives.

article thumbnail

Summary – “Industry in One: Financial Services”

ARMA International

The major categories of financial institutions include central banks, retail and commercial banks, investment banks, investment companies, brokerage firms, internet banks, credit unions, and savings and loans associations. financial institutions. Risk Management and RIM.