night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Data Encryption Shields the Energy Sector Against Emerging Threats
Sharon Ginga
Data Encryption Shields the Energy Sector Against Emerging Threats

Security of CNI is a national security issue The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for…

Read More
Selecting the Right Cloud SSO Solution for Your Organization
Danna Bethlehem
Selecting the Right Cloud SSO Solution for Your Organization

Modern architectures and applications place additional demands on access management tools. This blog will introduce access management evaluation criteria guidelines and discuss…

Read More
Luna HSM 7 Certified for eIDAS Protection
Hermann Bauer
Luna HSM 7 Certified for eIDAS Protection

Thales Luna Hardware Security Module (HSM) v.7.7.0, our flagship product, is …

Read More
Top 10 of 2020: Our Favorite Pieces from a Weird Year
Rachel Present Schreter
Top 10 of 2020: Our Favorite Pieces from a Weird Year

2020 has certainly been an unusual year. We never imagined a year of working from home at this level, and I’m sure I’m not the only one eager for casual social interaction once…

Read More
Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing
April Burghardt
Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing

New EU restrictions could force companies to change data transfer practices and adopt more advanced data encryption methods Traditionally, privacy has taken…

Read More
Using Encryption with Access Controls to Mitigate Malware and Ransomware Damage
Rajesh Gupta
Using Encryption with Access Controls to Mitigate Malware and Ransomware Damage

Recently the headlines have been dominated by infected enterprise software that has resulted in malware and hackers gaining access to mission critical infrastructures, taking…

Read More