Posted on 26 September 2018 by Alex Tay
With the rise of new technologies, such as mobility, cloud, and virtualization, enterprises need to adopt encryption to keep sensitive data secure, especially the data stored on-premise. In this blog, we emphasize the importance of key management when implementing a secure information gateway.
Posted on 05 September 2018 by Shao Xiong
According to Gemalto’s 2017 Breach Level Index Report, publicly reported data breaches compromised more than 2.5 billion data records as a result of 1,765 security incidents throughout the year. North America made up the bulk of these incidents at 1,514 security events, or 86 percent of the total. The Asia/Pacific region had just 113 incidents. […]
Posted on 08 August 2018 by Thales DIS
Financial Services companies operating in the State of New York have until September 3, 2018 to be in compliance with the new mandates of the New York State Cybersecurity Requirements for Financial Services Companies, known as 23 NYCRR Part 500. While there are several new requirements in this latest round of rolling compliance deadlines, the […]
Posted on 13 April 2018 by Thales DIS
Break down of the 2017 Breach Level Index stats found: 7,125,940 compromised every day 2,96914 compromised records every hour 4,949 compromised records every minute 82 compromised records every second Last year was a monumental year for data breaches. According to the new Breach Level Index (BLI), in 2017, the number of data records compromised in […]
Posted on 22 November 2017 by Thales DIS
Uber Data Breach Demonstrates Need for Better User of Authentication, Data Encryption, and Faster Disclosure Uber Technologies Inc. has fired its chief security officer (CSO) and one of his deputies for helping to cover up a 2016 data breach in which hackers stole the personal data of 57 million riders and drivers. On 22 November, […]
Posted on 06 November 2017 by Thales DIS
Gemalto is excited to announce the launch of SafeNet Data Protection on Demand, our new data security-as-a-service platform to help you deliver cost effective encryption, hardware security modules and key management services in the cloud to protect sensitive and regulated data.