- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009

The security of cryptographic processes is dependent on the security of the cryptographic keys used to encrypt the data. If the keys used to encrypt or tokenize data are stolen…
Read More
In February of this year, we launched a new partner program, the Thales Accelerate Partner Network (Accelerate), for our cloud protection and licensing business. The program…
Read More
It’s my privilege to share my insights on IoT security that were published recently in the esteemed ISACA Journal on June 3 (available only to registered members…
Read More
The more we know about the threats we face, the better our chances of keeping our data secure and our business name out of the headlines. This is exactly the purpose of the…
Read More
In an unprecedented global crisis such as COVID-19, organisations that have implemented new technologies and put together a cohesive approach to their business continuity and…
Read More
With more cryptographic keys to protect, more value in the data being protected by those keys, and proliferating compliance requirements (including those of GDPR, PCI DSS, and…
Read More