New Approach to Multi-Factor Authentication
Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to ensure the identities of entities within a Public Key Infrastructure (PKI). Two primary components of multi-factor authentication are "what you have"--such as a securely stored private key--and "what you know", a password to unlock access to the securely-stored credentials. For human users, multi-factor authentication is easil...
Dissecting and Preventing Advanced Phis...
How FedEX, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign File-borne attacks are on the rise, and 80% of successful breaches are new, unknown, or zero-day attacks that are not recognized by traditional signature-based detection solutions, such as antivirus. An example of this is an April 2020 attack that delivered Dridex ransomware to FedEx, UPS, and DHL customers. Sophisticated phishing emails--cleverly disguised to app...
Best Practices for Strong Authentication
Protecting your Intellectual Property and Online Transactions Certificate-based, multi-factor authentication is a mainstay security technique used by the U.S. Federal Government to secure access to agency networks, protect the identities of users, and ensure that a user is who they claim to be. Evolving needs around cloud applications and mobile devices, combined with rising threats, and the need to reduce costs, require entirely new considera...
Future Briefing: Cloud Data Security Ti...
We are at digital war and data is the target. No organization is immune from data security threats and the US Federal government is no exception. More than half of federal data is now stored in the cloud, and a significant portion is sensitive. Yet, despite this exposure, in the 2020 Thales Data Threat Report 99% of federal government respondents say at least some of their sensitive data in the cloud is not encrypted. IT security departments m...
Data Security in a Perimeterless World
Historically, organizations have taken a perimeter based approach to cyber security, with the belief that a strong perimeter protected the IT infrastructure behind it. But, as agencies modernize legacy systems and move apps, systems and workloads to the cloud – and more employees, contractors and citizens connect remotely and from multiple devices – something is happening across federal networks; the perimeter is dissolving. Data i...
Learning How to Secure your Digital Tra...
Thales enables federal agencies to accelerate their digital transformation vision and execution by making data safe in any environment, all while maintaining business agility. Our data security platform provides:EncryptionTokenizationHSM SolutionsAdvanced Key ManagementJoin us for a live webinar on August 29th to learn how we protect structured and unstructured data at rest, in motion, and in use across devices, processes, platforms, and envir...
Protecting Sensitive and Compliant Anal...
Big data collects and analyzes large amounts of data from heterogeneous sources to discover unprecedented new knowledge and understanding of scientific and business scenarios. Aiming to gain greater insight into patterns not generally discernible from smaller data sets, big data business intelligence enables visibility into associations and trends that otherwise go unnoticed.However, big data exposes the enterprise to numerous data security th...
Securing Virtual Machine-Based Security...
Join us for a complimentary webinar on May 30, 2019 to learn about the strong partnership between Thales eSecurity, the industry leader in access control encryption and key management solutions, and FireEye, the industry leader in external threat intelligent services.The Thales Vormetric Data Security Platform produces detailed security intelligence log information on file level access of sensitive data including server activity, access attemp...
The Changing Landscape of Data Security...
With digital government initiatives underway throughout U.S. Federal agencies, new attacks occurring daily, and traditional threats, many agencies are struggling to protect critical citizen data, financial information and government secrets. In this session we’ll address the state of data security in U.S. Federal agencies today, the changing landscape of risks to data, and agency IT security pros priorities for data security today. Based...
Data Security Summit
In modernization efforts across government, agencies are doing more than replacing or updating legacy systems. They are leveraging the cloud and related technologies to make the IT enterprise more efficient, adaptable and scalable. In the process, they are also making the enterprise more diverse and complex, especially as they adopt a multi-cloud approach to delivering access to services and data. Unfortunately, this increased diversity and co...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.