Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Digital Transformation Efforts are Putting Sensitive Government Data at Risk

Despite Increase in Data Breaches, Proper Investment in Data Protection Is Low for Agencies

Thales, a leader in critical information systems, cybersecurity and data protection, announces that the push towards digital transformation in the US government is putting sensitive data at risk, according to its 2019 Thales Data Threat Report – Federal Edition. The research, conducted by analyst firm IDC, indicates that as agencies embrace new technologies, such as multi-cloud deployments, they are struggling to implement proper data security.

Read More: Technology Industry M&A deals in September 2019 total $9.4bn Globally

“As digital transformation expands the number and position of attack vectors, the layers of security must expand and be repositioned to address new needs,” said Frank Dickson, program vice president for security products research, IDC. “As a result, agencies require flexible, consolidated security platforms that will enable them to manage greater amounts of complexity, spanning legacy on-premises as well as cloud-based and edge-oriented technologies.”

Almost all (98%) of respondents from federal agencies report that they are using sensitive data within digital transformation technology environments In fact, usage of digitally transformative technologies is high, as over 80% already use or plan to use these technologies within the next year. These technologies include cloud, big data, mobile payments, social media, containers, blockchain and IoT. Yet, less than a third of respondents are using data encryption within these environments today even though it was identified as a key solution for securing sensitive data when using it on digitally transformative technologies. So, the question that federal agencies need to ask is whether digital transformation deployments are really secure?

“In many cases, security problems arise from well-known, long-standing vulnerabilities that agencies have not addressed, including limited use of data encryption and the abuse of privileged user policies,” said Nick Jovanovic, VP, federal, Thales Cloud Protection & Licensing. “Modernization and transformation efforts can create new vulnerabilities that result in data breaches, with security measures often being applied after the fact. As such, agencies need platforms that help them to better manage these environments and enable protection down to the data layer.”

Read More: Dotscience Releases New Advancements to Enable Simplest Method for Building, Deploying and Monitoring ML Models in Production on Kubernetes Clusters to Accelerate the Delivery of Business Value from AI

Related Posts
1 of 41,060

The Reality of the Multi-Cloud Agency

The report found that agencies continue to move to multi-cloud environments as part of their digital transformation efforts with 78% of respondents using sensitive data in the cloud. Specifically, 66% of respondents have 26 or more Software-as-a-Service (SaaS) applications, 52% have three or more Infrastructure-as-a-Service (IaaS) applications and 41% have three or more Platform-as-a-Service (PaaS) applications. It comes as no surprise that 43% perceive complexity as the top barrier to deploying data security.

Despite Increase in Data Breaches Agencies Still Not Focused on Prevention

Although 60% of respondents have encountered a data breach and 35% have had one during the past year, prevention is at the bottom of the IT security spending priority list. The bottom three security spending priorities include managing previous data breaches (30%), addressing compliance/privacy requirements (27%) and avoiding data breach penalties (24%). Furthermore, over 80% of agencies are feeling vulnerable, with more than a third feeling extremely vulnerable.

Data Privacy and Sovereignty Regulations Impact all Agencies

Agencies across the government face a myriad of security-related laws and initiatives – such as FIPS, FISMA and FedRAMP. That said, roughly a quarter indicated they failed a compliance audit in the last year. To combat these challenges, over half of the respondents identified encryption and tokenization as the leading strategies to meet regulatory concerns.

Read More: Change Management Emerges As the Most Urgent Challenge Facing the Global Life Insurance Industry

2 Comments
  1. Copper scrap repurposing Scrap Copper recycling center Scrap metal waste management
    Copper cable scrapping, Metal scrap traceability, Copper scrap supply

  2. Iron waste processing says

    Scrap metal reclamation company Ferrous material recycling standards compliance Iron reclamation and reuse

    Ferrous metal salvage services, Iron scrap refabrication, Scrap metal value optimization

Leave A Reply

Your email address will not be published.