night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Insights from CNSA 2 0 and FIPS 140 3
Shaun Chen
Future-Proof Your Crypto Strategy for the Post-Quantum Age: Insights from CNSA 2.0 and FIPS 140-3

IntroductionImagine a world where hackers could easily crack the encryption protecting your most sensitive information. With the potential challenge of quantum…

Read More
Securing GenAI Workloads on AWS with Sovereign Solutions
David Ortega
Securing the Journey to AI with Thales Sovereign Solutions for AWS

Amazon Web Services (AWS) is the world's largest cloud service provider. Unsurprisingly, they are committed to providing tools, solutions, and best practices that allow their…

Read More
The Rise of Privacy-by-Design: APRA's Impact on Business Practices
Ammar Faheem
The Rise of Privacy-by-Design: APRA's Impact on Business Practices

When it comes to privacy, the regulatory landscape in the US is a patchwork of laws, where individual states like California lead the way with regulations like its California…

Read More
Implement Passwordless 360° for Enhanced Security and UX
Haider Iqbal
Implement Passwordless 360° for Enhanced Security and UX

If you’ve somehow missed it, let me state the obvious: Passwordless is a strategic bet! Many organizations realize this already. But if there was ever a doubt, have a look at…

Read More
Guide to Achieving ISO27001:2022 Compliance
Vivian Lee
Guide to Achieving ISO27001:2022 Compliance

ISO/IEC 27001:2022 the latest edition of the internationally recognized standard for information security management systems (ISMS), introduces several significant updates and…

Read More
How to Investigate and Recover After a Ransomware Attack
Russel McDonald
Bouncing Back: How to Investigate and Recover After a Ransomware Attack

You've likely seen the headlines about ransomware attacks and the monumental challenges they pose for organizations. But what should you do when an attack occurs, even if you…

Read More