night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Thales and Fujitsu: An expanded partnership for delivering HSMs in the cloud and on-premises
Sharon Ginga
Thales and Fujitsu: An expanded partnership for delivering HSMs in the cloud and on-premises

According to the 2019 Thales Cloud Security Study, almost half of all businesses are adopting a multi-cloud strategy when it comes to…

Read More
Protecting Critical Infrastructure and Essential Services with High Speed Encryption
Jennifer Dean
Protecting Critical Infrastructure and Essential Services with High Speed Encryption

As COVID-19 continues to dominate our thoughts and affect all aspects of our everyday lives, we try to maintain some sort of normalcy by spending more time with our families,…

Read More
Industry 4.0 and Securing the IoT
Sharon Ginga
Industry 4.0 and Securing the IoT

Industry 4.0 describes the fourth industrial revolution – industry based on the Internet of Things. At its core, Industry 4.0 includes customization, or individualization, of…

Read More
World Password Day: Eliminate or Rename?
Danna Bethlehem
World Password Day: Eliminate or Rename?

Back in 2004, during the RSA Security Conference, Bill Gates—then CEO of Microsoft—predicted…

Read More
Let’s Get One Thing Straight: Passwords AREN’T the Best Authentication Method
Dirk Geeraerts
Let’s Get One Thing Straight: Passwords AREN’T the Best Authentication Method

The COVID-19 pandemic has taught organizations that having staff work from home comes with its benefits. It’s even likely that having a remote workforce could be more…

Read More
Guest Blog: 6 Key Considerations for IoT Security by Design
Chris Hickman
Guest Blog: 6 Key Considerations for IoT Security by Design

It’s no secret that Internet-connected devices need security to protect data – and the device itself – from compromise. However, in many cases, IoT products are not engineered…

Read More