banner

Thales Blog

Thales Thales | Cloud Protection & Licensing Solutions
Key Management Strategies in the Cloud Part 3: Trust Everyone, Trust No-one or Trust Someone
Thales
Key Management Strategies in the Cloud Part 3: Trust Everyone, Trust No-one or Trust Someone

Having outlined yesterday the need to take an information-centric approach to key management in the cloud, today I would like to share… Read More

Key Management Strategies In The Cloud Part 2 How Might We Better Think About Key Management In The Cloud?
Thales
Key Management Strategies In The Cloud Part 2 How Might We Better Think About Key Management In The Cloud?

As outlined in my last post, crypto and key management clearly have a lot to offer in terms of the Cloud, but in a bid to get ahead… Read More

Key Management Strategies In The Cloud Part 1: Are We Thinking About Key Management In The Cloud In The Right Way?
Thales
Key Management Strategies In The Cloud Part 1: Are We Thinking About Key Management In The Cloud In The Right Way?

There is a lot of talk in certain circles at the moment about key management in distributed on-demand computing environments (aka ‘the… Read More

RSA To Replace All SecurID Tokens In The Field
Thales
RSA To Replace All SecurID Tokens In The Field

RSA have finally broken their silence over the extent of the SecurID breach and the implications are not good.

When I last wrote… Read More

On Gmail, Cybersecurity And Passwords
Thales
On Gmail, Cybersecurity And Passwords

Another day, another cyber security headline. This time it’s the… Read More

Advanced Persistent Threat
Thales
Advanced Persistent Threat

This is how RSA Security described the infiltration that lead to the now-famous attack which “reduce[d] the effective security of [… Read More