Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Encrypt Everything: Thales to Roll Out New Crypto Security Offerings at RSA Conference 2019

Kubernetes thought leadership and virtual reality challenge also featured at leading global security event

Thales, a leader in critical information systems, cybersecurity and data security, will demonstrate in booth #N6183 at this year’s RSA Conference how CIOs and CISOs can protect all facets of their business as the urgency to move digital transformation forward reach heightened levels.

Organizations, in the rush to complete their digital transformation are quickly adopting new technologies. The recent 2019 Thales Data Threat Report-Global Edition found that 97% of enterprises are using sensitive data within digitally transformative environments but, only 30% are encrypting that data, leaving enterprises open to significant risk. These results underscore the importance for government and business to develop a more significant encryption strategy.

Read More: Turn.io Launches Behaviour Change Chat Platform for Social Impact

New Capabilities on Display that Address Application Layer Security

Thales will be showcasing new capabilities that streamline the process of adding encryption, tokenization, masking and other cryptographic functions to applications. These new features leverage an environment’s best sample code and APIs, making a developer’s job easier and more efficient. Securing data at the application layer, with separation of duties for key management, provides the highest levels of protection and compliance.

Securing Kubernetes

With multi-cloud environments, comes increased Kubernetes adoption. Kubernetes continues to skyrocket because it is open, enables workloads to roam between on-premises, hybrid, and public cloud infrastructures, and has been proven to orchestrate billions of containers a week. However, all that makes Kubernetes wonderful for an organization also makes it a prime target for hackers and crypto miners. In a speaking session at RSA Conference 2019, Sol Cates, Thales eSecurity vice president of technology strategy and CTO, will share proven best practices to lock down production Kubernetes workloads so data is protected in every environment.

Related Posts
1 of 41,062
  • What: Kubernetes Deployments: How Not to Get Hacked
  • Who: Sol Cates, VP of Technology Strategy, CTO, Thales eSecurity
  • When: Tuesday, March 5 at 10:20 a.m.
  • Where: North Briefing Center

Read More: Dutch Ex-Chief of Defence Joins San Francisco AI Company HAL24K

Making a Case for Enterprise Class Key Management

Thales is again participating in the OASIS Interoperability showcase, highlighting the key management interoperability protocol (KMIP) standard with its Vormetric Data Security Platform. The demonstration highlights Thales’s comprehensive KMIP server capabilities and interoperability with a variety of participating vendors’ KMIP client devices. In addition, Thales key management experts will be available to discuss the evolution of the KMIP standard, the contribution of Thales as an originating author of the KMIP specification, as well as implementation of the latest specification of the standard, KMIP 2.0.

Can You Beat the Hackers?

Hackers have breached an underwater data center belonging to a global company with troves of sensitive data. Visitors to the Thales booth can take part in a 10-minute virtual reality challenge to see if they can beat the hackers for a chance to win an Oculus Go VR Headset.

Tina Stewart, vice president of market strategy at Thales eSecurity says:

“With our research illustrating that nearly every enterprise has experienced a breach and continue to be at risk, discussing a data security strategy is vitally important. Before fully embarking on a digital transformation journey, it is vitally important that enterprises implement encryption to safeguard their sensitive data. That’s where Thales comes in. RSA Conference is the perfect venue where customers, prospects and partners can see for themselves how enterprises around the globe have relied on Thales to secure their digital transformation, comply with regulatory mandates and protect against ongoing data breaches.”

Read More: VoltDB Secures $10 Million in Series C Funding to Meet Demand for 5G Data Requirements

2 Comments
  1. can i be resistant to bentyl says

    This medication must not be used by children younger
    than 6 months old because of the risk of serious side effects.
    How to use Dicyclomine HCL. Take this.

  2. Copper scrap licensing Copper scrap marketing strategies Scrap metal drop-off
    Export of Copper cable scrap, Metal waste reconstruction, Environmental copper disposal

Leave A Reply

Your email address will not be published.