night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Forrester Predicts 193% ROI with Thales CipherTrust Data Security Platform
Krishna Ksheerabdhi December 6, 2022
Forrester Predicts 193% ROI with Thales CipherTrust Data Security Platform

A Forrester study commissioned by Thales found that CipherTrust Data Security Platform offered excellent quantified and unquantified benefits to the organizations investing in…

Read More
Cybersecurity Implications of Quantum Computing
Blair Canavan December 1, 2022
A New Era: Cybersecurity Implications of Quantum Computing

Rapid developments in quantum computing, such as IBM's Quantum Condor processor with a 1000…

Read More
NIS2 Directive - Social Card
Sharon Ginga November 29, 2022
What is the NIS2 Directive and How Does It Affect You?

The European Union enacted the Network and Information System (NIS) regulation in July 2016 with the intention of ensuring a specific level of security for networks and…

Read More
Are Retailers Shopping
Marcelo Delima November 23, 2022
Are Retailers Shopping for a Cybersecurity Breach?

Have you ever walked into your favorite store or restaurant, and when you tried to finalize your purchase, you were told that they could not process any credit cards? Have you…

Read More
How to Secure Access for your Seasonal Workers
Sarah Lefavrais November 21, 2022
How to Secure Access for your Seasonal Workers

As the holiday season approaches, many retail, hospitality, logistics, and food manufacturing organizations hire seasonal workers to meet increasing demand. The Bureau of Labor…

Read More
Manufacturing needs to adopt a Zero Trust approach
Todd Moore November 15, 2022
Manufacturing needs to adopt a Zero Trust approach to mitigate increased cyber threats

Long gone is the time when manufacturing systems and operations were siloed from the Internet and, therefore, were not a cybersecurity target. Nowadays, any organization is…

Read More