night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Win the connected and autonomous car race while protecting data privacy
Marcelo Delima
Win the connected and autonomous car race while protecting data privacy

The future has arrived for the automobile industry. We may not yet be flying out of our garages, but our vehicles have come a long way in the past few years. Most of these…

Read More
Ericsson Extends 5G Core Authentication Solution with Thales Hardware Security Module
Mohammed Jabr
Ericsson Extends 5G Core Authentication Solution with Thales Hardware Security Module

5G is changing the security landscape. The need for security increases to effectively address a growing number of new use cases, new devices, going well beyond consumer mobile…

Read More
Award Winning Solutions to Achieve a Holistic Approach to Cybersecurity
Poupak Modirassari-Enbom
Award Winning Solutions to Achieve a Holistic Approach to Cybersecurity

A holistic, cloud-based cybersecurity solution helps organizations quickly and easily increase their security posture, and comprehensively address the key areas of…

Read More
Best Practices for a Modern Cloud Security Architecture
Cameron Skidmore
Best Practices for a Modern Cloud Security Architecture

For decades Red Hat has helped bring the power of open source to companies around the world. Partnering with Thales, Red…

Read More
Implementing Data Protection and Key Management in DevOps without slowing things down
Robert Masterson
Implementing Data Protection and Key Management in DevOps without slowing things down

As enterprises develop software in today’s environment, where everything has digitally transformed and must follow Zero Trust policies, new challenges arise that can complicate…

Read More
Not All Authentication Methods Are Equally Safe
Danna Bethlehem
Not All Authentication Methods Are Equally Safe

There is broad recognition by security leaders that stronger authentication is foundational to preventing data breaches. As recently as September 2021, US Deputy National…

Read More