Posted on 21 April 2015 by Thales DIS
Many organisations are sitting on information assets of huge worth — just because they are not making the most of them doesn’t change that fact. So, which data assets can be valuable and to whom, for better or worse?
Posted on 27 April 2015 by Thales DIS
If there is one thing we can take away from this year’s RSA Conference it’s this: We do not have a technology problem, we have a mindset problem. There are plenty of very good security technologies available today, and walking around the RSA Conference show floor you really got a sense of the sheer volume […]
Posted on 04 May 2015 by Thales DIS
Breaches happen; of course they do. Over the years I have seen organizations suffer both internal and external attacks – from naive misuse of computer systems or contraventions of what constitutes acceptable use, right up to fully fledged attempts at data hacking, fraud or extortion. Sometimes CIOs respond quickly and effectively, accepting responsibility and taking […]
Posted on 15 May 2015 by Thales DIS
In his podcast recorded by Help Net Security at RSA this year, you’ll learn how the data security changes in the last 5 years have led the infosec industry to where it is today.
Posted on 17 June 2015 by Thales DIS
What is the allure of the cloud? Sure, there’s the cost savings and flexibility when trying out new ideas and proofs of concept; not having to commit to acquiring all the necessary infrastructure and the associated CapEx costs. There’s even an entire market segment out there, devoted to helping you maximize cloud spending and efficiency. […]
Posted on 08 July 2015 by Thales DIS
Key to becoming a ‘mobile enterprise’ is the ability to manage and secure the identities and data within an IT ecosystem whose boundaries are becoming increasing blurry. This blog series explores how enterprises can do so to gain enterprise mobile security.