Data and securityCyber SecurityCloud adoption and escalating threats accelerate encryption deployment (Infographic)

Cloud adoption and escalating threats accelerate encryption deployment (Infographic)

The results of the 2017 Global Encryption Trends Study show that cloud adoption and escalating threats are accelerating the adoption of encryption technology

The results of the 2017 Global Encryption Trends Study show that cloud adoption and escalating threats are accelerating the adoption of encryption technology.

The report, based on independent research by the Ponemon Institute and sponsored by Thales, captures how organisations around the world are dealing with compliance, increased threats, and the implementation of encryption to protect their most sensitive data.

The report found that 41% of respondents have an encryption strategy applied consistently across the enterprise. What’s more, for the first time in the study’s 12-year history, business unit leaders have a higher influence over encryption strategy than IT operations.

Other critical findings demonstrate organisations continue to show a preference for control over encryption and key management when those activities migrate to the cloud.

Further findings from the study can be found in the following infographic.

Related Articles

NCSC defends UK from more than 10 cyber attacks a week

Cyber Security NCSC defends UK from more than 10 cyber attacks a week

6d Austin Clark
GDS clarifies private sector access to GOV.UK Verify

Cyber Security GDS clarifies private sector access to GOV.UK Verify

1w Austin Clark
Is automation essential in the cyber security battle?

Cyber Security Is automation essential in the cyber security battle?

1m Austin Clark
Please mind the security gap between the premises and the cloud

Cloud Computing Please mind the security gap between the premises and the cloud

1m Guest Writer
NHS trusts not discouraging WhatsApp, Facebook Messenger and other consumer apps

Cyber Security NHS trusts not discouraging WhatsApp, Facebook Messenger and other consumer apps

2m Austin Clark
Best form of defence: Is the Government's cyber strategy on the right track?

Cyber Security Best form of defence: Is the Government's cyber strategy on the right track?

2m Guest Writer
Making the cloud a safe space

Cloud Computing Making the cloud a safe space

2m Guest Writer
Leading cyberlaw academic calls for review of CCTV and AFR implementation

Cyber Security Leading cyberlaw academic calls for review of CCTV and AFR implementation

3m Austin Clark