article thumbnail

NEW TECH: DataLocker introduces encrypted flash drive — with key pad

The Last Watchdog

One sliver of the $90 billion, or so, companies are expected to spend this year on cybersecurity products and services is an estimated $85 million they will shell out for encrypted flash drives. A chance meeting – in an elevator, no less – led to Kim veering over to the cybersecurity industry. Related: How DataLocker got its start h.

article thumbnail

Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption

Thales Cloud Protection & Licensing

Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption. Microsoft DKE using Thales Luna HSMs makes it easy for organizations to follow security and key management best practices to meet compliance needs, while still realizing the benefits that hosting data in Microsoft Azure has to offer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSA Conference 2023: Meet Thales Where the World Talks Security!

Thales Cloud Protection & Licensing

RSA Conference 2023: Meet Thales Where the World Talks Security! Meet us at Booth #N-5369 for demonstrations on data security, customer and workforce identity, and post quantum cryptography – just to name a few. This year’s theme “ Stronger Together ” echoes our company culture. In cybersecurity, we are a community of many.

article thumbnail

Adventures in cyber litigation: Frozen crypto-assets and the role of cyber insurance

Data Protection Report

Given the level of interest in the case, we have prepared a deeper-dive into the facts and the implications of the decision, with a focus on the important role played in the case by cyber insurance. Until recently, there had not been an example of a cyber insurer actively participating in a recovery action. This is set out below.

article thumbnail

How to Decrypt Ransomware Files – And What to Do When That Fails

eSecurity Planet

However, even with the best planning, organizations can find a few users, machines, or systems that were overlooked or whose backup may be corrupted or encrypted. First, call the cyber insurance company that issued the organization’s cybersecurity policy. Insured companies often will not have options. Eliminate attacker access.

article thumbnail

A Guide to Key Management as a Service

Thales Cloud Protection & Licensing

The most effective way to ensure data security is through encryption and proper key management. Key Management as a Service (KMaaS) allows companies to manage encryption keys more effectively through a cloud-based solution instead of running the service on physical, on-premises hardware.

article thumbnail

Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing

Thales Cloud Protection & Licensing

New EU restrictions could force companies to change data transfer practices and adopt more advanced data encryption methods. Multinationals face difficult and unique compliance challenges to successfully meet the ongoing waves of government regulations for data privacy and security. Tue, 12/22/2020 - 10:08. In the Dec. In the Dec.