night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Quantum Resistant Encryption – Are You Ready?
Brian Grant
Quantum Resistant Encryption – Are You Ready?

Some good news and a couple of tips for being prepared. Over the past few months, a handful of Thales CPL clients have mentioned their concern regarding the future…

Read More
Trick or Treat: The Choice is Yours with Multifactor Authentication
Danna Bethlehem
Trick or Treat: The Choice is Yours with Multifactor Authentication

Whether you want the ‘trick’ of a malevolent threat actor infiltrating your network by exploiting a compromised password or the ‘treat’ from the peace of mind associated with…

Read More
The Many Challenges of a Multi-Cloud Business Environment
Sol Cates
The Many Challenges of a Multi-Cloud Business Environment

The pandemic merely accelerated what has been a long-term broad adoption of cloud environments, including multi-cloud and hybrid deployments. The benefits of cloud come with…

Read More
Fast and Safe Protection for 5G Subscriber Privacy and Authentication
Chen Arbel
Fast and Safe Protection for 5G Subscriber Privacy and Authentication

The protection and authenticity of subscriber authentication and privacy in 5G networks is equally important to requirements for increased reliability and low latency. Thales…

Read More
Identity Protection Role in Zero Trust Security Model
Eric Avigdor
Building confidence in employee identity protection is core to zero trust security

Over the past 18 months, business models, operating procedures and interaction with customers has changed significantly. Accelerated cloud migration and work from anywhere…

Read More
Thales
Licenses vs. Entitlements: Know your rights

How can you ensure that your company is complying with its contractual obligations around the use of third-party software? Moreover, how can you be sure that those software…

Read More