night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Thales leading the way with PCI-approved remote management solutions
Ian Hermon
Thales leading the way with PCI-approved remote management solutions

There is an increasing focus in the payments world regarding certifications. After all, transaction processing systems require robust security techniques in their attempts to…

Read More
Key steps on the road to LGPD compliance
Ludmila Rinaudo
Key steps on the road to LGPD compliance

Brazil, the largest country in both South America and Latin America, released a data privacy law bringing new business opportunities, especially in the international domain.…

Read More
The four steps to modernizing your IAM environment and moving to cloud-based access management
Danna Bethlehem
The four steps to modernizing your IAM environment and moving to cloud-based access management

Before the onset of COVID-19, enterprises already had Identity Access Management (IAM) controls in place for company stakeholders working remotely. Enterprises secured…

Read More
Critical Success Factors to Widespread Deployment of IoT
Welland Chu
Critical Success Factors to Widespread Deployment of IoT

Digital technology and connected IoT devices have proliferated across industries and into our daily lives. Electric grid utilities are deploying smart meters to better…

Read More
Accelerate Partner Network: Our Extended Sales Team Committed to Serving You, Our Customer
Dave Jordan
Accelerate Partner Network: Our Extended Sales Team Committed to Serving You, Our Customer

Last year, Thales launched the Accelerate Partner…

Read More
Analyzing 4 Common Attack Vectors for Supply Chain Attacks
Kieran Miller
Guest Blog Post: Analyzing Four Common Attack Vectors for Supply Chain Attacks

Cyber criminals employ a number of different tactics to gain access to enterprise networks and data. One such tactic is to inject malware into a software product the enterprise…

Read More