Posted on 04 May 2015 by Thales DIS
Breaches happen; of course they do. Over the years I have seen organizations suffer both internal and external attacks – from naive misuse of computer systems or contraventions of what constitutes acceptable use, right up to fully fledged attempts at data hacking, fraud or extortion. Sometimes CIOs respond quickly and effectively, accepting responsibility and taking […]
Posted on 15 May 2015 by Thales DIS
In his podcast recorded by Help Net Security at RSA this year, you’ll learn how the data security changes in the last 5 years have led the infosec industry to where it is today.
Posted on 01 June 2015 by Stephen Kingston
When we think about industries and the significant challenges with handling PII and PCI, the ecosystem surrounding healthcare bears specific attention. In today’s world this medical ecosystem has undergone significant change based on the following criteria: Changes in What Constitutes Healthcare – the amount of healthcare options available to consumers has grown significantly – from […]
Posted on 17 June 2015 by Thales DIS
What is the allure of the cloud? Sure, there’s the cost savings and flexibility when trying out new ideas and proofs of concept; not having to commit to acquiring all the necessary infrastructure and the associated CapEx costs. There’s even an entire market segment out there, devoted to helping you maximize cloud spending and efficiency. […]
Posted on 08 July 2015 by Thales DIS
Key to becoming a ‘mobile enterprise’ is the ability to manage and secure the identities and data within an IT ecosystem whose boundaries are becoming increasing blurry. This blog series explores how enterprises can do so to gain enterprise mobile security.
Posted on 16 July 2015 by Thales DIS
In today’s global economy, data is king. Organizations are mining their available data to personalize customer experiences, automate processes, outperform the competition, and guide other important business initiatives and decisions. As a result, they’re not only producing more of it, but they’re also storing, processing, and distributing it in more places. So what does that […]