night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Meet Thales at RSA Conference 2026 Booth N-6265 for AppSec, Data Security, and AI security demos.
Chad Couser
Heading to RSA Conference 2026? Mark your Calendar and Meet Thales!

The countdown is on. From March 23–26, the cybersecurity community will gather once again at the Moscone Center in San Francisco, and Thales will be at the heart of it.

Read More
Thales SafeNet Trusted Access on Google Cloud Marketplace
Aurelien Narcisse
SafeNet Trusted Access is Now Available on Google Cloud Marketplace

We’re excited to share that Thales SafeNet Trusted Access, the industry’s leading passwordless authentication and access management solution is now available on Google Cloud…

Read More
Cloud computing as critical infrastructure requiring structured resilience standards
Chris Harris
Should Cloud Be Classed as Critical Infrastructure?

Over the past few years, large-scale cloud outages have demonstrated just how deeply digital services are woven into the fabric of…

Read More
The Top 5 Questions: How DSPM Illuminates the Murky World of Multi-Cloud Data Security
Lynne Murray
The Top 5 Questions: How DSPM Illuminates the Murky World of Multi-Cloud Data Security

Multi-cloud data security threats are escalating at an unprecedented rate. According to Forrester and the 2025 Thales Global Cloud Data Security Study, the primary drivers of…

Read More
AI Emerges as the New Insider Threat
Todd Moore
AI Emerges as the New Insider Threat: Thales Releases the 2026 Data Threat Report

Over the past year, I’ve watched AI move to operational reality across nearly every industry we work with. The conversation is no longer about whether AI will transform…

Read More
Payment data identified as the weakest link in cybersecurity protection systems
Karen Kelvie
When Payment Data Becomes the Weakest Link

Most cybersecurity incidents don’t begin with an attack. They begin with a design decision. Four people experienced that reality in the same week. Different roles. Different…

Read More