Digital security provider Gemalto is claiming an industry-first with the launch of a new solution that it says will enable organisations, which have invested in public key infrastructure security applications, to leverage their investment without compromising on security or user experience when moving to the cloud.
More than four billion data records were compromised by data breaches worldwide in the first half of 2018, with six social media breaches accounting for more than 56% of the records compromised, according to a new global security report.
New Zealand’s competition regulator The Commerce Commission has sent a letter of issue to defence contractor Thales over its proposed acquisition of fellow data encryption hardware and software provider Gemalto, raising concerns about the impact of the deal on product prices and quality.
New Zealand’s competition regulator The Commerce Commission is weighing up whether to approve the proposed acquisition of data encryption hardware and software provider Gemalto by the e-security division of Thales.
Global ICT services company Tech Data has inked a distribution agreement for Australia and New Zealand with digital security provider Gemalto.
There are some curious inconsistencies in IT decision makers' view of their organisations' posture, judging by a new study.
Gemalto's Evolution event brought together "leading cyber security experts and cyber security technology partners" to rethink the ways businesses adapt to data security and digital transformation.
The majority of authentication methods used by organisations "aren’t up to scratch compared to those offered by consumer websites such as Facebook and Amazon," according to the latest research from Gemalto.
• Australian (43%) businesses are about as careful as Indian (49%) but more careful than Japanese (31%) businesses when sharing sensitive information with 3rd parties in the cloud environment
• Only a third of Australian businesses are proactive in managing compliance with privacy and data protection regulations in the cloud environment
• 61% of respondents in Australia are not confident that their organizations have visibility into the use of cloud computing applications, platform or infrastructure services
• 57% of Australian respondents believe it is more difficult to protect confidential or sensitive information in the cloud
Gemalto, the world leader in digital security, can today reveal that while the vast majority of global companies (95%) have adopted cloud services, there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths (40%) of the data stored in the cloud is secured with encryption and key management solutions.
The findings – part of a Gemalto commissioned Ponemon Institute “2018 Global Cloud Data Security Study” – found that organizations in Australia (46%), the UK (35%) and Japan (31%) are less cautious than those in Germany (61%) when sharing sensitive and confidential information stored in the cloud with third parties. The study surveyed more than 3,200 IT and IT security practitioners worldwide to gain a better understanding of the key trends in data governance and security practices for cloud-based services.
Germany’s lead in cloud security extends to its application of controls such as encryption and tokenization. The majority (61%) of German organizations revealed they secure sensitive or confidential information while being stored in the cloud environment, ahead of the US (51%) and Japan (50%).
Crucially, however, over three quarters (77%) of organizations across the globe recognize the importance of having the ability to implement cryptologic solutions, such as encryption. This is only set to increase, with nine in 10 (91%) believing this ability will become more important over the next two years – an increase from 86% last year.
Managing privacy and regulation in the cloud
Despite the growing adoption of cloud computing and the benefits that it brings, it seems that global organizations are still wary. Worryingly, half report that payment information (54%) and customer data (49%) are at risk when stored in the cloud. Over half (57%) of global organizations also believe that using the cloud makes them more likely to fall foul of privacy and data protection regulations, slightly down from 62% in 2016.
Due to this perceived risk, almost all (88%) believe that the new General Data Protection Regulation (GDPR), will require changes in cloud governance, with two in five (37%) stating it would require significant changes. As well as difficulty in meeting regulatory requirements, three-quarters of global respondents (75%) also reported that it is more complex to manage privacy and data protection regulations in a cloud environment than on premise networks, with France (97%) and the US (87%) finding this the most complex, just ahead of India (83%).
Head in the clouds
Despite the prevalence of cloud usage, the study found that there is a gap in awareness within businesses about the services being used. Only a quarter (25%) of IT and IT security practitioners revealed they are very confident they know all the cloud services their business is using, with a third (31%) confident they know.
Looking more closely, shadow IT may be continuing to cause challenges. Over half of Australian (61%), Brazilian (59%) and British (56%) organizations are not confident they know all the cloud computing apps, platform or infrastructure services their organization is using.
Fortunately, the vast majority (81%) believe that having the ability to use strong authentication methods to access data and applications in the cloud is essential or very important. Businesses in Australia are the keenest to see authentication put in place, with 92% agreeing it would help ensure only authorised people could access certain data and applications in the cloud, ahead of India (85%) and Japan (84%).
“The benefit of the cloud is its convenience, scalability and cost control in offering options to businesses that they would not be able to access or afford on their own, particularly when it comes to security said Graeme Pyper, A/NZ Regional Director at Gemalto. However, while securing data is easier, there should never be an assumption that cloud adoption means information is automatically secure. Just look at the recent Accenture and Uber breaches as examples of data in the cloud that has been left exposed. No matter where data is, the appropriate controls like encryption and tokenization need to be placed at the source of the data. Once these are in place, any issues of compliance should be resolved.”
For more details, download the “2018 Global Cloud Data Security Study”.
Gemalto (Euronext NL0000400653 GTO) is the global leader in digital security, with 2016 annual revenues of €3.1 billion and customers in over 180 countries. We bring trust to an increasingly connected world.
From secure software to biometrics and encryption, our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between.
Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.
Our 15,000+ employees operate out of 112 offices, 43 personalization and data centers, and 30 research and software development centers located in 48 countries.
Digital security firm Gemalto last month released its “2018 Global Cloud Data Security Study” report, commissioning the Ponemon Institute to perform the research, surveying more than 3200 IT and IT security practitioners worldwide.
Many Australians are failing to adequately secure their data, including their social media accounts, despite increasing vulnerability to data breaches, according to new research.
SafeNet Data Protection on Demand is Gemalto's data security-as-a-service product for enterprises and managed service providers.
Digital security provider Gemalto released research this week that claimed 90% of consumers lack confidence in the security of Internet of Things devices.
Millennials, a.k.a. Gen Y, Net Generation, or Generation Now. Regardless of what you call them the infamous millennial characteristics are trying the patience of enterprise network security.
Digital security firm Gemalto asks, "Do you know where your data is?", revealing 1792 disclosed data breaches in 2016 led to almost 1.4 billion data records being compromised.
With data breaches up 15%, compromised data records up 31% compared to the previous six months, and with identity and personal data theft accounting for 64% of all data breaches, this is one report you’ll want to read.
The pending introduction of mandatory data breach notification laws in Australia provides an opportunity for the federal government to provide “robust guidance” and signal to business that they can't afford to take a relaxed approach to information security, according to the regional ANZ chief of digital security company Gemalto.
Machine-to-machine (M2M) technology enables communications between machines, central portals or IT systems and fosters an environment of innovation, driving new ideas and smarter decisions.
While some people say they just want their carrier to provide the pipe and then stay out of the way, a survey has found that a large majority of mobile users would be happy to take cloud services from their carriers.
Not for the first time the High Court has merely highlighted a flaw in one of our long standing laws[…]
I just watched the UK TV series The Undeclared War. It's a fascinating play on the theme of cybersecurity --[…]
Fav class is Mage, Fav deck is anything that uses random spells, I make my own decks I don't net[…]
Proving once more that this saga is as much about his celebrity lawyers as it is about securing Assange’s freedom.[…]
Fav deck at the moment is Miracle Rogue and my fav card of all time is Coldlight Oracle.