Encryption, Two-factor authentication, RSA, Cryptography, Key, Information security

Trust and Security Challenges Remain Despite Rising Blockchain Adoption

On Oct 26, 2020
@FintechBot shared
Trust and Security Challenges Remain Despite Rising Blockchain Adoption https://t.co/8AgJxAdYH1 by @fintechsin 2020-10-26 02:37:06
Open

Blockchain adoption continues to rise across industries, though trust and security remain the two major challenges enterprises must address.

fintechnews.sg
On Oct 26, 2020
@FintechBot shared
Trust and Security Challenges Remain Despite Rising Blockchain Adoption https://t.co/8AgJxAdYH1 by @fintechsin 2020-10-26 02:37:06
Open

Trust and Security Challenges Remain Despite Rising Blockchain Adoption

Trust and Security Challenges Remain Despite Rising Blockchain Adoption

Blockchain adoption continues to rise across industries, though trust and security remain the two major challenges enterprises must address.

What Can a Blockchain Do?

What Can a Blockchain Do?

Financial institutions have financed the disruption of countless industries over the last 30 years; they have an idea of what a revolutionary technology can do to static incumbents. ...

Crypto Quantique Unveils the World's Most Advanced Product for IoT Security

Crypto Quantique Unveils the World's Most Advanced Product for IoT Security

Crypto Quantique showcases the first quantum-driven secure chip (QDSC) at IoT Solutions World Congress, Barcelona

Thales helps organizations combat the future security threats of quantum computing

Thales helps organizations combat the future security threats of quantum computing

Collaborations with ISARA Corporation and ID Quantique will make quantum-safe crypto more widely available to protect data in the cloud, applications and across networks

Blockchain and Data Security Intersections

Blockchain and Data Security Intersections

Blockchain offers a very reasonable alternative to the cloud and data storage companies. Data stored in a blockchain would remain pure and unaltered. Data security is considered to be quite ...

Using Foundational Controls to “Secure IT”

Using Foundational Controls to “Secure IT”

Once again, we find ourselves in the thick of National Cybersecurity Awareness Month (NCSAM). This year’s theme of “Own IT....

Threat detection and the evolution of AI-powered security solutions

Threat detection and the evolution of AI-powered security solutions

Ashvin Kamaraju, CTO and VP of Engineering, Thales, discusses the evolution of AI-powered security solutions, and threat detection challenges.

Cloud Data Security: Own Your Data Encryption Keys

Cloud Data Security: Own Your Data Encryption Keys

A range of information technology trends show that the cloud stampede continues unabated but more importantly, it’s a multi-cloud stampede. Meanwhile there are a range of both best ...

“Cloud Data Security: Own Your Data Encryption Keys”

“Cloud Data Security: Own Your Data Encryption Keys”

Numerous cloud trends, including storing sensitive data in cloud and the recognition that data security mandates also apply there, drive both cloud consumers and providers to endeavor to ...

Data security is falling behind as over half of FIs experience data breaches

Data security is falling behind as over half of FIs experience data breaches

Almost two-thirds of financial institutions in the US have experienced data breaches, compared with 55 per cent of non-US FIs, according to a study.

Data security innovator, Secure Channels, chooses Thales to provide key management and software licensing platform for IoT security solution

Data security innovator, Secure Channels, chooses Thales to provide key management and software licensing platform for IoT security solution

Thales’ encryption key management will provide data security innovator Secure Channels with secure quantum-resilient cybersecurity technology.

What goes into adding a new crypto on LocalCryptos

What goes into adding a new crypto on LocalCryptos

When LocalCryptos adds a new crypto to its inventory, we need to design and develop a new escrow script to fit the protocol. That's because unlike a custodial peer-to-peer platform, escrows ...

A New Leader in Data Protection

A New Leader in Data Protection

[ This article was originally published here ] It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital ...

Defending space data against the dark side

Defending space data against the dark side

We become more reliant on satellites every year, with their data critical to a large and growing range of services on which we – and our economies – depend. These services range from ...

National Day of Unplugging – how switching off can boost business security

National Day of Unplugging – how switching off can boost business security

Disconnecting from your mobile device, laptop or tablet can be as good as a holiday. Simply taking a pause from... The post National Day of Unplugging – how switching off can boost business ...