logo
#

Latest news with #Meudon

Thales 2025 Global Cloud Security Study Reveals Organizations Struggle to Secure Expanding, AI-Driven Cloud Environments
Thales 2025 Global Cloud Security Study Reveals Organizations Struggle to Secure Expanding, AI-Driven Cloud Environments

Associated Press

time2 days ago

  • Business
  • Associated Press

Thales 2025 Global Cloud Security Study Reveals Organizations Struggle to Secure Expanding, AI-Driven Cloud Environments

MEUDON, France--(BUSINESS WIRE)--Jun 30, 2025-- Thales, a global leader in technology and cybersecurity, today released the findings of its2025 Cloud Security Studyconducted by S&P Global Market Intelligence 451 Research, revealing that AI-specific security has rapidly emerged as a top enterprise priority, ranking second only to cloud security. Over half (52%) of respondents said they are prioritizing AI security investments over other security needs, signaling a shift in how organizations are allocating budgets in response to the accelerated adoption of AI. This year's research captures perspectives on cloud security challenges from nearly 3,200 respondents in 20 countries across a variety of seniority levels. This press release features multimedia. View the full release here: ©Thales Cloud remains at the forefront of security considerations Cloud is now an essential part of modern enterprise infrastructure, but many organizations are still building the skills and strategies needed to secure it effectively. The variability of controls across cloud providers, combined with the distinct mindset required for cloud security, continues to challenge security teams. This pressure is only increasing as AI initiatives drive more sensitive data into cloud environments, amplifying the need for robust, adaptable protections. This year's Thales Cloud Security Study confirms that cloud security remains a top concern for enterprises worldwide. Nearly two-thirds (64%) of respondents ranked it among their top five security priorities, with 17% identifying it as their number one. Security for AI, a new addition to the list of spending priorities this year, ranked second overall, highlighting its growing importance. Despite sustained investment, cloud security remains a complex, persistent challenge that goes beyond technology to include staffing, operations, and the evolving threat landscape. 'The accelerating shift to cloud and AI is forcing enterprises to rethink how they manage risk at scale,' SebastienCano, Senior Vice President, Cyber Security Products at Thales, said. 'With over half of cloud data now classified as sensitive, and yet only a small fraction fully encrypted, it's clear that security strategies haven't kept pace with adoption. To remain resilient and competitive, organizations must embed strong data protection into the core of their digital infrastructure.' The average number of public cloud providers per organization has risen to 2.1, with most also maintaining on-prem infrastructure. This growing complexity is driving security challenges with 55% of respondents reporting that cloud is harder to secure than on-prem, a 4-percentage-point increase from last year. As organizations expand through growth or M&A, they're also seeing a surge in SaaS usage, now averaging 85 applications per enterprise, complicating access control and data visibility. This complexity extends to security operations, with many teams struggling to align policies across varied platforms. The study found that 61% of organizations use five or more tools for data discovery, monitoring, or classification, and 57% use five or more encryption key managers. Attacks target cloud resources with human error remaining a top vulnerability Cloud infrastructure is a prime target for attackers as organizations continue to struggle with securing increasingly complex environments. According to the 2025 Thales Cloud Security Study, four of the top five most targeted assets in reported attacks are cloud-based. The rise in access-based attacks, as reported by 68% of respondents, underscores growing concerns around stolen credentials and insufficient access controls. Meanwhile, 85% of organizations say at least 40% of their cloud data is sensitive, yet only 66% have implemented multifactor authentication (MFA), leaving critical data exposed. Compounding the issue, human error remains a major contributing factor in cloud security incidents, from misconfigurations to poor credential management. ' A rising number of respondents report challenges in securing their cloud assets, an issue that is further amplified by the demands of AI projects that often operate in the cloud and require access to large volumes of sensitive data ,' Eric Hanselman, Chief Analyst at S&P Global Market Intelligence 451 Research, said. ' Compounding this issue, four of the top five targeted assets in reported attacks are cloud-based. In this environment, strengthening cloud security and streamlining operations are essential steps toward enhancing overall security effectiveness and resilience .' For more information, please download the full report and join our webinar hosted by Eric Hanselman, Chief Analyst at S&P Global Market Intelligence 451 Research . About Thales Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion. The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies. Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion. PLEASE VISIT Thales Group Cloud Protection & Licensing Solutions | Thales Group Cybersecurity Solutions | Thales Group View source version on CONTACT: PRESSThales, Media Relations Security & Cybersecurity Marion Bonnet +33 (0)6 60 38 48 92 [email protected] KEYWORD: FRANCE EUROPE INDUSTRY KEYWORD: APPS/APPLICATIONS TECHNOLOGY SECURITY BUSINESS PROFESSIONAL SERVICES INTERNET DATA ANALYTICS DATA MANAGEMENT ARTIFICIAL INTELLIGENCE SOURCE: Thales Copyright Business Wire 2025. PUB: 06/30/2025 03:00 AM/DISC: 06/30/2025 03:00 AM

Thales 2025 Global Cloud Security Study Reveals Organizations Struggle to Secure Expanding, AI-Driven Cloud Environments
Thales 2025 Global Cloud Security Study Reveals Organizations Struggle to Secure Expanding, AI-Driven Cloud Environments

National Post

time2 days ago

  • Business
  • National Post

Thales 2025 Global Cloud Security Study Reveals Organizations Struggle to Secure Expanding, AI-Driven Cloud Environments

Article content 52% report AI security spending is displacing traditional security budgets 55% report cloud environments are more complex to secure than on-premises infrastructure Enterprises now use an average of 85 SaaS applications, contributing to security tool sprawl Article content MEUDON, France — Thales, a global leader in technology and cybersecurity, today released the findings of its 2025 Cloud Security Study conducted by S&P Global Market Intelligence 451 Research, revealing that AI-specific security has rapidly emerged as a top enterprise priority, ranking second only to cloud security. Over half (52%) of respondents said they are prioritizing AI security investments over other security needs, signaling a shift in how organizations are allocating budgets in response to the accelerated adoption of AI. This year's research captures perspectives on cloud security challenges from nearly 3,200 respondents in 20 countries across a variety of seniority levels. 'With over half of cloud data now classified as sensitive, and yet only a small fraction fully encrypted, it's clear that security strategies haven't kept pace with adoption.' Cloud is now an essential part of modern enterprise infrastructure, but many organizations are still building the skills and strategies needed to secure it effectively. The variability of controls across cloud providers, combined with the distinct mindset required for cloud security, continues to challenge security teams. This pressure is only increasing as AI initiatives drive more sensitive data into cloud environments, amplifying the need for robust, adaptable protections. Article content This year's Thales Cloud Security Study confirms that cloud security remains a top concern for enterprises worldwide. Nearly two-thirds (64%) of respondents ranked it among their top five security priorities, with 17% identifying it as their number one. Security for AI, a new addition to the list of spending priorities this year, ranked second overall, highlighting its growing importance. Despite sustained investment, cloud security remains a complex, persistent challenge that goes beyond technology to include staffing, operations, and the evolving threat landscape. Article content 'The accelerating shift to cloud and AI is forcing enterprises to rethink how they manage risk at scale,' Sebastien Cano, Senior Vice President, Cyber Security Products at Thales,said. 'With over half of cloud data now classified as sensitive, and yet only a small fraction fully encrypted, it's clear that security strategies haven't kept pace with adoption. To remain resilient and competitive, organizations must embed strong data protection into the core of their digital infrastructure.' Article content The average number of public cloud providers per organization has risen to 2.1, with most also maintaining on-prem infrastructure. This growing complexity is driving security challenges with 55% of respondents reporting that cloud is harder to secure than on-prem, a 4-percentage-point increase from last year. As organizations expand through growth or M&A, they're also seeing a surge in SaaS usage, now averaging 85 applications per enterprise, complicating access control and data visibility. Article content This complexity extends to security operations, with many teams struggling to align policies across varied platforms. The study found that 61% of organizations use five or more tools for data discovery, monitoring, or classification, and 57% use five or more encryption key managers. Article content Attacks target cloud resources with human error remaining a top vulnerability Article content Cloud infrastructure is a prime target for attackers as organizations continue to struggle with securing increasingly complex environments. According to the 2025 Thales Cloud Security Study, four of the top five most targeted assets in reported attacks are cloud-based. The rise in access-based attacks, as reported by 68% of respondents, underscores growing concerns around stolen credentials and insufficient access controls. Meanwhile, 85% of organizations say at least 40% of their cloud data is sensitive, yet only 66% have implemented multifactor authentication (MFA), leaving critical data exposed. Compounding the issue, human error remains a major contributing factor in cloud security incidents, from misconfigurations to poor credential management. ' Article content A rising number of respondents report challenges in securing their cloud assets, an issue that is further amplified by the demands of AI projects that often operate in the cloud and require access to large volumes of sensitive data Article content ,' Eric Hanselman, Chief Analyst at S&P Global Market Intelligence 451 Research, said. ' Article content Compounding this issue, four of the top five targeted assets in reported attacks are cloud-based. In this environment, strengthening cloud security and streamlining operations are essential steps toward enhancing overall security effectiveness and resilience Article content .' Article content For more information, please download the full report and join our webinar hosted by Eric Hanselman, Chief Analyst at S&P Global Market Intelligence 451 Research. About Thales Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion. Article content Article content Article content Article content Article content Contacts Article content PRESS Article content Thales, Media Relations Article content Article content Security & Cybersecurity Article content Article content Marion Bonnet Article content Article content Article content

Imperva Application Security Integrates API Detection and Response, Setting A New Standard in API Security
Imperva Application Security Integrates API Detection and Response, Setting A New Standard in API Security

National Post

time24-06-2025

  • Business
  • National Post

Imperva Application Security Integrates API Detection and Response, Setting A New Standard in API Security

Article content Article content First unified, single-pane-of-glass platform to deliver real-time detection and mitigation of API threats, including Broken Object Level Authorization (BOLA) and other advanced business logic threats Offers flexible deployment across cloud and on-premise environments, with a privacy-forward design to secure APIs at scale. Article content MEUDON, France — Thales today announced new detection and response capabilities in the Imperva Application Security platform to protect against business logic attacks, such as Broken Object Level Authorization (BOLA) – the leading threat in the OWASP API Security Top 10. By integrating real-time detection with automated mitigation of risky APIs, BOLA attacks, unauthenticated APIs, and deprecated APIs, Imperva Application Security platform delivers comprehensive protection against unauthorized data exposure and other complex business logic vulnerabilities across cloud and on-premises environments. APIs have become the backbone of modern applications, enabling businesses to seamlessly connect services, optimize operations, and deliver personalized experiences at scale. According to Imperva Threat Research, APIs accounted for 71% of all web traffic. More recently, the team observed a sharp rise in API-directed attacks, with 44% of advanced bot traffic targeting APIs, compared to just 10% targeting web applications. This shift underscores how attackers are increasingly exploiting API endpoints that manage sensitive and high-value data. Article content Why BOLA is a Critical Business Risk Article content BOLA occurs when APIs fail to properly verify whether users are authorized to access specific data objects. This allows attackers to manipulate requests and gain unauthorized access to sensitive information. As the leading OWASP Top 10 API threat, BOLA exposes businesses to significant risks, including data breaches, compliance failures, and loss of customer trust. Article content 'API security is no longer optional Article content – Article content it's fundamental to maintaining business continuity and trust,' said Tim Chang, Global Vice President and General Manager of Application Security at Thales. 'Imperva Application Security bridges the gap by delivering a fully unified platform that identifies business logic threats and actively blocks malicious sessions, setting a new benchmark for API protection.' Article content Empowering Enterprises with a Unified, Flexible, and Privacy-First Solution Article content Imperva Application Security integrates advanced threat detection engines with automated inline responses and flexible deployment options, enabling security teams to detect and respond to API attacks like BOLA without slowing development or disrupting the user experience. For customers who want to protect their API infrastructure, Imperva Application Security delivers the following benefits: Article content Unified Platform Architecture: Manage API discovery, risk assessment, detection, and mitigation in a single console, eliminating tool sprawl and operational friction across cloud and on-premises environments. Real-Time BOLA Detection: Hybrid behavioral and rule-based engines analyze API request patterns, scoring anomalies, and flagging endpoints for immediate action. Automated Response and Remediation: Integration with Imperva Cloud WAF and WAF Gateway enables a variety of response actions, including inline mitigation actions such as automatically blocking malicious API traffic in real-time. Integration with security automation tools ensures rapid incident orchestration. Article content Advancing the Imperva Security Anywhere Vision The integration of API detection and response into Imperva Application Security is foundational to the Imperva Security Anywhere vision, which provides scalable, end-to-end protection for applications and APIs across any environment. This unified solution provides enterprises with a comprehensive view of automated threats targeting APIs and the necessary tools to protect those APIs. Article content Detection and response to deprecated APIs, unauthenticated APIs, and BOLA attacks are now available as part of Imperva Application Security. Article content About Thales Article content Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion. Article content The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies. Article content Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion. Article content Article content Article content Article content Article content Contacts Article content Thales, Media Relations Article content Article content Article content Marion Bonnet Article content Article content Article content

Thales Launches File Activity Monitoring (FAM) to Strengthen Real-Time Visibility and Control Over Unstructured Data
Thales Launches File Activity Monitoring (FAM) to Strengthen Real-Time Visibility and Control Over Unstructured Data

National Post

time10-06-2025

  • Business
  • National Post

Thales Launches File Activity Monitoring (FAM) to Strengthen Real-Time Visibility and Control Over Unstructured Data

Article content New capability gives instant visibility to detect misuse, enforce compliance, and strengthen data protection across on-premises, hybrid, and multicloud environments. Continuous data discovery, classification, and monitoring forms the foundation of effective Data Security Posture Management, while simplifying compliance and flagging unauthorized activities that lead to data exposure. FAM's built-in GenAI tools and centralized management streamlines audit reporting, accelerates threat response, reduces operational complexity across enterprise data lifecycle. Article content MEUDON, France — Thales today announced the launch of Thales File Activity Monitoring, a powerful new capability within the Thales CipherTrust Data Security Platform that enhances enterprise visibility and control over unstructured data, enabling organizations to monitor file activity in real time, detect misuse, and ensure regulatory compliance across their entire data estate. As the only integrated platform provider that secures structured and unstructured data, Thales provides comprehensive monitoring and auditability for data types that were previously difficult to track. 'As unstructured data grows rapidly across distributed environments, organizations need more integrated ways to track and safeguard their most sensitive information,' Todd Moore, Vice President of Data Security Products at Thales, said. Article content In today's evolving threat landscape, organizations must gain tighter control over unauthorized access and misuse of unstructured data, which according to IDC represents 90% of all worldwide data. File Activity Monitoring enables security teams to analyze and monitor the activity of unstructured data, including unexpected copying, downloading, and sharing of files such as emails, chat logs, media files, and application logs that can contain sensitive data. Real-time alerts, analytics, and encryption tracking further accelerate threat insights and protect sensitive data across the enterprise. This reduces exposure risks, supports compliance with standards like GDPR, HIPAA, and PCI DSS, and strengthens organizations' overall data security posture. Article content 'Thales' innovative approach to File Activity Monitoring tackles key challenges like blind spots in hybrid environments, offering real-time visibility and smart anomaly detection — a potential game-changer for teams overwhelmed by false positives. By striking the right balance of depth and simplicity, FAM shows promise in helping us strengthen the SOC without added complexity. With tighter SIEM integration, it can sharpen response and let teams focus on what matters most. We're excited to see how FAM evolves and enhances our data security,' Leila KUNTAR, Principal Information Security Engineer, Amadeus, said. 'As unstructured data grows rapidly across distributed environments, organizations need more integrated ways to track and safeguard their most sensitive information,' Article content . Article content 'With File Activity Monitoring, Thales reinforces its leadership in enterprise data security by delivering real-time insight, intelligent automation, and unified visibility through a single, powerful platform.' Article content Thales has been a leader in digital security for decades in structured database activity. Building on this extensive expertise, customers can expect the same world-class experience that they've had with Thales, now extended to encompass unstructured data protection. File Activity Monitoring strengthens DSPM by enabling security teams to: Article content Discover, classify, observe, and control sensitive data across on-premises, hybrid, and multicloud environments Pinpoint where sensitive data resides, who has access, and whether it's properly secured, in real time, allowing detection of suspicious behavior including unauthorized copying, downloading, or sharing Transform static classification into dynamic risk intelligence through behavioral context Apply strong encryption and other remediation techniques, including reconstruction of incidents quickly with audit logs in the event of a breach or policy violation and enabling strong encryption, to protect compromised or at-risk data Article content Built-in GenAI tools simplify audits, boost response, and cut complexity Article content To further simplify compliance and security operations, File Activity Monitoring includes a Generative AI-powered Data Security Assistant. This integrated chatbot helps teams query audit data, generate custom reports, and streamline compliance workflows, reducing the burden on IT and security professionals and making it easier to meet regulatory obligations. Article content 'As technology evolves rapidly, our controls must be flexible enough to keep pace without adding complexity,' Moore said. 'Automation and intelligence help overwhelmed security teams scale operations and focus on what matters most. With tools like our chatbot, they can ask natural language questions and get instant, actionable answers, accelerating response times and improving operational efficiency.' Article content About Thales Article content Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion. Article content Article content Article content Article content Article content Contacts Article content Thales, Media Relations Article content Article content Article content Marion Bonnet Article content Article content Article content

Vallourec Announces Share Repurchase Program
Vallourec Announces Share Repurchase Program

Yahoo

time27-05-2025

  • Business
  • Yahoo

Vallourec Announces Share Repurchase Program

Press release VALLOUREC ANNOUNCES SHARE REPURCHASE PROGRAM Meudon (France), May 27, 2025 – Vallourec, a world leader in premium seamless tubular solutions, announces its intention to repurchase shares. Vallourec intends to execute a buyback in the amount of approximately 1.2 million shares which will be carried out by June 20th. The repurchased shares will be allocated to the service of employees' long term incentive plans. This buyback reflects the desire of Vallourec to manage future equity dilution and will be carried out in accordance with the buyback program approved by the General Shareholders' Meeting of May 22, 2025 (ninth resolution), which is described in section 5.2.4.2 of the 2024 Universal Registration Document. About Vallourec Vallourec is a world leader in premium seamless tubular solutions for the energy markets and for demanding industrial applications such as oil & gas wells in harsh environments, new generation power plants, challenging architectural projects, and high-performance mechanical equipment. Vallourec's pioneering spirit and cutting edge R&D open new technological frontiers. With close to 13,000 dedicated and passionate employees in more than 20 countries, Vallourec works hand-in-hand with its customers to offer more than just tubes: Vallourec delivers innovative, safe, competitive and smart tubular solutions, to make every project possible. Listed on Euronext in Paris (ISIN code: FR0013506730, Ticker VK), Vallourec is part of the CAC Mid 60, SBF 120 and Next 150 indices and is eligible for Deferred Settlement Service. In the United States, Vallourec has established a sponsored Level 1 American Depositary Receipt (ADR) program (ISIN code: US92023R4074, Ticker: VLOWY). Parity between ADR and a Vallourec ordinary share has been set at 5:1. For further information, please contact: Investor relations:Connor LynaghTel: +1 (713) Individual shareholders: Toll Free number (From France): 0 805 65 10 10 actionnaires@ Press relations: TaddeoRomain GrièreTel: +33 (0)7 86 53 17 Nicolas Escoulan Tel: +33 (0)6 42 19 14 74 Attachment Vallourec_Press Release_Share Repurchase ProgramSign in to access your portfolio

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store