Blogger profile: Thales DIS

The company behind our blog. Anonymous authors and former employees are assigned the Thales DIS pen name. You are still welcome to add your comments and contact us regarding these subjects.

Website: http://www.twitter.com/ThalesDigiSec


Get in touch with Thales DIS :

Comments or questions are welcome.

* indicates required field

Other blogs by the same author

GDPR One Year Anniversary: What We’ve Learned So Far

On May 25, the European Union celebrated the first anniversary of the enforcement of the General Data Protection Regulation (GDPR), the most important change in data privacy regulations in the last decade, designed to restructure the way in which personal data is handled across every sector (public or private) and every industry. Now that one year has passed since the GDPR came into effect, we’ve had a lot of questions arising.

One Year Later: Finding Harmony between GDPR and the Cloud

As the EU embarked on a new relationship with the GDPR (General Data Protection Regulation) Council, new regulations were firmly implemented on May 25th, 2018. Companies across Europe had to find new ways of working while better managing their data privacy. Read more about finding harmony between GDPR and the Cloud now one year later since GDPR’s implementation.

One Year After GDPR: Significant rise on Data Breach reporting…

It’s been one year since the European Union (EU) enforced the General Data Protection Regulation (GDPR), legislation designed to protect the personal data of EU citizens and lay specific rules and guidelines on how their data is collected, stored, processed and deleted by various entities. During this year, a number of European DPAs have confirmed that the new regulation has led to a significant rise in reported data breaches, clearly demonstrating the impact GDPR has had on raising awareness with the general public as well as organizations regarding their rights and obligations under EU data protection law.

Unmasking Data Masking

Business organisations today are handling massive volumes of data at various levels in their operation. With digitization being implemented on a huge scale, data breach is now among the primary concerns that business entities are either facing or fearing. In this blog post, we will touch upon data masking – one of the most popular ways to secure sensitive data.

Understanding Key Management Policy – Part 2

In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with cybercriminals getting more sophisticated, merely encrypting data is not sufficient.