night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
  • Data Security
  • Identity & Access Management
  • Software Monetization
  • Access Control
  • Application Encryption
  • APT
  • Big Data
  • Brexit
  • Channel
  • Cloud Computing
  • Cloud Encryption Gateway
  • Cloud Security
  • Cloud Storage Encryption
  • Compliance
  • Critical Infrastructure
  • Cybersecurity
  • Cyber War
  • Data Breach
  • Data Breach Disclosure
  • Data Firewall
  • Data Masking
  • Database Encryption
  • Digital Payments
  • Encryption
  • Encryption Key Management
  • GDPR
  • Government
  • Healthcare
  • Insider Threat
  • Internet Of Things
  • IoT
  • Key Management
  • Mobile Payments
  • Privileged User
  • Regulation and compliance
  • SaaS Encryption
  • Security Intelligence
  • State Data Breach Notification
  • Tokenization
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Passwordless 360°: Unblocking the Challenges of FIDO Key Management
Gregory Vigroux
Passwordless 360°: Unblocking the Challenges of FIDO Key Management

With sensitive data and apps dispersed across fragmented computing environments, multi-factor authentication (MFA) has emerged as the best way to authenticate and protect our…

Read More
Your PCI-DSS v4.0 Roadmap: Charting a Course of Education, Analysis & System Enhancements.
Shane Tully
Your PCI-DSS v4.0 Roadmap: Charting a Course of Education, Analysis & System Enhancements

The Payment Card Industry Data Security Standard (PCI-DSS) v4.0 is about protecting cardholder data and maintaining the secure reputation of the industry as a whole. Cyber…

Read More
Redefining Security: The Power of Passwordless Authentication
Amit Prakaash
Redefining Security: The Power of Passwordless Authentication

In the face of rapidly evolving cyber threats, the traditional method of securing sensitive information through passwords has become alarmingly vulnerable. As organizations…

Read More
Insights from CNSA 2 0 and FIPS 140 3
Shaun Chen
Future-Proof Your Crypto Strategy for the Post-Quantum Age: Insights from CNSA 2.0 and FIPS 140-3

IntroductionImagine a world where hackers could easily crack the encryption protecting your most sensitive information. With the potential challenge of quantum…

Read More
Securing GenAI Workloads on AWS with Sovereign Solutions
David Ortega
Securing the Journey to AI with Thales Sovereign Solutions for AWS

Amazon Web Services (AWS) is the world's largest cloud service provider. Unsurprisingly, they are committed to providing tools, solutions, and best practices that allow their…

Read More