night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
  • Select Category
Archive
  • Archive
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
The Future of Payments Security
Paul Hampton January 26, 2021
The Future of Payments Security

Criminals use a wide range of methods to commit fraud. The increasing trend of using mobile payments for in-store purchases (especially during the pandemic) is leading…

Read More
WHAT IT TAKES TO ACHIEVE SAUDI ARABIA’S VISION 2030
Ahmad Abdallah January 21, 2021
What it Takes to Achieve Saudi Arabia’s Vision 2030

SAUDI ARABIA’S VISION 2030 Through Vision 2030, the Kingdom of Saudi Arabia (KSA) intends to reduce dependence on oil, diversify its economy, and develop public…

Read More
Focus on Good Hygiene to Protect Yourself Against Digital Pandemics
Claudia Dunphy January 19, 2021
Focus on Good Hygiene to Protect Yourself Against Digital Pandemics

By now everyone in the security world has heard of the chaos surrounding the…

Read More
Thales Security Sessions Podcast 3
Francois Lasnier January 15, 2021
Thales Security Sessions Podcast 3 - The Digital Identity Challenge

“Do you know who I am?” Remember the early days of Identity and Access Management (IAM), when you knew who was accessing your network at all times? The pandemic has…

Read More
Data Encryption Shields the Energy Sector Against Emerging Threats
Sharon Ginga January 13, 2021
Data Encryption Shields the Energy Sector Against Emerging Threats

Security of CNI is a national security issue The energy sector is part of the critical national infrastructure (CNI), and delivers services that are essential for…

Read More
Selecting the Right Cloud SSO Solution for Your Organization
Danna Bethlehem January 7, 2021
Selecting the Right Cloud SSO Solution for Your Organization

Modern architectures and applications place additional demands on access management tools. This blog will introduce access management evaluation criteria guidelines and discuss…

Read More