night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Where Do You Hide The Keys To Your Safe?

Richard Moulds, VP Product Strategy at Thales eSecurity, discusses the biggest challenges found with the encryption process and how organizations can adopt hardware security…

Read More
What Makes Your Key Different From Your Neighbours'?

Joe Warren, product manager, Network Encryption Products at Thales eSecurity, discusses the importance of high assurance key management. …

Read More
IEEE Data Breach Demonstrates The Need For Increased Data Protection Measures
IEEE Data Breach Demonstrates The Need For Increased Data Protection Measures

The Institute of Electrical and Electronics Engineers (IEEE), one of the leading standards-making…

Read More
Two-Factor Authentication; Only One Piece Of The Puzzle To Protecting Your Data

In response to a number of recent events in which authentication credentials were compromised, we have seen Dropbox and other cloud services providers begin to implement two-…

Read More
And The Hits Keep On Coming: Encryption The Key To Healthcare Data Protection?
Tina Stewart
And The Hits Keep On Coming: Encryption The Key To Healthcare Data Protection?

As I see the seemingly endless reports of breaches it does seem obvious that progress in the protection of healthcare still lags.…

Read More
Breaching The Perimeter: Data-centric Strategies Can Help Protect Your Company’s Sensitive Data
Tina Stewart
Breaching The Perimeter: Data-centric Strategies Can Help Protect Your Company’s Sensitive Data

I recently read a Mandiant research report…

Read More