night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
The Vital Role of Enterprise Key Management in Disaster Recovery
Jeff Miller
Ensuring Resilience: The Vital Role of Enterprise Key Management in Disaster Recovery

In the fast-paced era where every second counts, robust key management practices are central to successful high availability (HA) and disaster recovery (DR) strategies.…

Read More
The Surge of Identity and Access Management
Paige Elliott
The Surge of Identity and Access Management (IAM): Unveiling the Catalysts

The domain of Identity and Access Management (IAM) has undergone a remarkable surge, underpinned by a myriad of factors spanning technology,…

Read More
Exploring AI: Regulations and Threat Mitigation
Tim Phipps
Exploring AI: Regulations and Threat Mitigation

It’s something we’ve all heard repeatedly, but it’s a point worth hammering home: AI will shape the future of humanity. This fact is not lost on policymakers, and they are…

Read More
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations
Blair Canavan
Thales PQC Partner Ecosystem Facilitates and Accelerates Quantum-Safe Migrations

As many organizations begin to embark on their journey toward Post-Quantum Cryptography (PQC) resilience, Thales can facilitate and perhaps accelerate these migrations with its…

Read More
The Post-Quantum Cryptography Algorithms are finalized! Now what?
Todd Moore
The Post-Quantum Cryptography Algorithms are finalized! Now what?

With the recent release from NIST about their final, published Post-Quantum Cryptography (PQC) algorithms (ML-KEM (formerly Kyber), ML-DSA (formerly Dilithium), SLH-DSA (…

Read More
How Cybersecurity Can Save Critical Infrastructure
Marcelo Delima
How Cybersecurity Can Save Critical Infrastructure

Critical infrastructure (CI) has become a prime target for malicious actors seeking to manipulate, disrupt, or undermine the operation of industrial control systems (ICS).…

Read More