- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![Rock the Blockchain: Thales and DigiCert Secure the Data](/sites/default/files/content/blog/field_image/2021-09/thales-and-digicert%20-secure-the-data-blog-image.jpg)
It’s a staggering statistic, but 39% of companies are still not using robust data security measures. In 2019 alone, 7.9 billion data records were breached, quadrupling in 2020…
Read More![Authentication and access management increasingly perceived as core to Zero Trust Security](/sites/default/files/content/blog/field_image/2021-09/authentication-and-access-management-increasingly-perceived-as-core-to-zero-trust-security-blog-image.jpg)
The changing global environment has brought many changes to all organizations. While many consider that remote access to corporate resources and data as the key disruption,…
Read More![Securing the Identities of Connected Cars](/sites/default/files/content/blog/field_image/2021-09/securing-the-identities-of-connected-cars-blog-image.jpg)
A Hybrid Approach to PKI Deployment for Modern Manufacturers Manufacturing is one of the most attacked industries, facing a range of cybersecurity challenges. The…
Read More![Securing Italy’s Journey to the Cloud](/sites/default/files/content/blog/field_image/2021-09/securing-italys-journey-to-the-cloud-blog-image.jpg)
Italy is increasingly adopting cloud computing technologies and platforms to accelerate the country’s digital transformation. The move affects both state agencies and small to…
Read More![The White House Gets Serious About Cybersecurity](/sites/default/files/content/blog/field_image/2021-08/white-house-gets-serious-about-cybersecurity-blog-images.jpg)
During the 2021 Thales Crypto Summit, which brings together a group of experts to speak about…
Read More![The challenge of cloud shared responsibility – whose keys are they, anyway?](/sites/default/files/content/blog/field_image/2021-08/hampton-083121-blog.jpg)
Key management – the processing, management and storage of keys for who can decrypt and access protected information – is an often-overlooked, and yet critical element of…
Read More