- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![Data Encryption Shields the Energy Sector Against Emerging Threats](/sites/default/files/content/blog/field_image/2021-01/data-encryption-shields-energy-sector.jpg)
Security of CNI is a national security issue The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for…
Read More![Selecting the Right Cloud SSO Solution for Your Organization](/sites/default/files/content/blog/field_image/2021-01/selecting-the-right-cloud-sso-solution-feature-image.jpg)
Modern architectures and applications place additional demands on access management tools. This blog will introduce access management evaluation criteria guidelines and discuss…
Read More![Luna HSM 7 Certified for eIDAS Protection](/sites/default/files/content/blog/field_image/2021-01/luna-hsm-7-certified-for-eidas-protection-blog-featured-image.jpg)
Thales Luna Hardware Security Module (HSM) v.7.7.0, our flagship product, is …
Read More![Top 10 of 2020: Our Favorite Pieces from a Weird Year](/sites/default/files/content/blog/field_image/2020-12/our-favorite-pieces-from-a-weird-year-blog-featured-image.jpg)
2020 has certainly been an unusual year. We never imagined a year of working from home at this level, and I’m sure I’m not the only one eager for casual social interaction once…
Read More![Cross-Border Data Privacy and Security Concerns in the Dawn of Quantum Computing](/sites/default/files/content/blog/field_image/2020-12/cross-border-data-privacy-blog-featured-image.jpg)
New EU restrictions could force companies to change data transfer practices and adopt more advanced data encryption methods Traditionally, privacy has taken…
Read More![Using Encryption with Access Controls to Mitigate Malware and Ransomware Damage](/sites/default/files/content/blog/field_image/2020-12/mitigate-malware-and-ransomware-damage-blog-featured-image.jpg)
Recently the headlines have been dominated by infected enterprise software that has resulted in malware and hackers gaining access to mission critical infrastructures, taking…
Read More