night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
  • Select Category
Archive
  • Archive
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Thales Earns 5-Star Rating in 2021 CRN Partner Program Guide
C.J. Radford April 6, 2021
Thales Earns 5-Star Rating in 2021 CRN Partner Program Guide

CRN, a brand of the Channel Company, publishes its Partner Program Guide every year as a means for solutions providers to learn more about the partner programs operated by some…

Read More
Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption
Skylar Davies April 1, 2021
Protecting Sensitive Data with Luna Key Broker for Microsoft Double Key Encryption

Today’s remote working environment relies heavily on the collaborative sharing of information, challenging organizations to maintain the security of confidential data and…

Read More
Zero Trust Is a Journey and Businesses Have Many Rivers to Cross
Danna Bethlehem March 31, 2021
Zero Trust Is a Journey and Businesses Have Many Rivers to Cross

Organizations are facing challenging times when it comes to securing their corporate assets, systems, networks and data. Digital transformation, proliferation of location…

Read More
More Digital, More Cloud – To Trust, or Not to Trust
Chris Harris March 26, 2021
More Digital, More Cloud – To Trust, or Not to Trust

In the past, cloud adoption by many organizations was directed towards a “cloud first” strategy, meaning that new applications would be built for cloud deployment. However, in…

Read More
The Hand of Amazon: How the financial industry must keep up
Paul Hampton March 24, 2021
The Hand of Amazon: How the financial industry must keep up

Originally published in Finextra on…

Read More
When It Comes to Software Supply Chain Security, Good Enough Just Isn’t Enough
Robert Masterson March 18, 2021
When It Comes to Software Supply Chain Security, Good Enough Just Isn’t Enough

Increasingly, attacks on the software development and delivery process have resulted in malware being introduced into software builds with catastrophic consequences. In a…

Read More