night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
The Surge of Identity and Access Management
Paige Elliott
The Surge of Identity and Access Management (IAM): Unveiling the Catalysts

The domain of Identity and Access Management (IAM) has undergone a remarkable surge, underpinned by a myriad of factors spanning technology,…

Read More
Exploring AI: Regulations and Threat Mitigation
Tim Phipps
Exploring AI: Regulations and Threat Mitigation

It’s something we’ve all heard repeatedly, but it’s a point worth hammering home: AI will shape the future of humanity. This fact is not lost on policymakers, and they are…

Read More
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations
Blair Canavan
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations

As many organizations begin to embark on their journey toward Post-Quantum Cryptography (PQC) resilience, Thales can facilitate and perhaps accelerate these migrations with its…

Read More
The Post-Quantum Cryptography Algorithms are finalized! Now what?
Todd Moore
The Post-Quantum Cryptography Algorithms are finalized! Now what?

With the recent release from NIST about their final, published Post-Quantum Cryptography (PQC) algorithms (ML-KEM (formerly Kyber), ML-DSA (formerly Dilithium), SLH-DSA (…

Read More
How Cybersecurity Can Save Critical Infrastructure
Marcelo Delima
How Cybersecurity Can Save Critical Infrastructure

Critical infrastructure (CI) has become a prime target for malicious actors seeking to manipulate, disrupt, or undermine the operation of industrial control systems (ICS).…

Read More
CIAM Build vs. Buy: Choosing the Right Customer Identity and Access Management Solution
Maarten Stultjens
Selecting the Right CIAM Strategy: Build Versus Buy

If you’re in the process of developing a Customer Identity and Access (CIAM) strategy for your organization, you may be considering taking a Do-It-Yourself (DIY) approach. You…

Read More