- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
The security of cryptographic processes is dependent on the security of the cryptographic keys used to encrypt the data. If the keys used to encrypt or tokenize data are stolen…
Read MoreIn February of this year, we launched a new partner program, the Thales Accelerate Partner Network (Accelerate), for our cloud protection and licensing business. The program…
Read MoreIt’s my privilege to share my insights on IoT security that were published recently in the esteemed ISACA Journal on June 3 (available only to registered members…
Read MoreThe more we know about the threats we face, the better our chances of keeping our data secure and our business name out of the headlines. This is exactly the purpose of the…
Read MoreIn an unprecedented global crisis such as COVID-19, organisations that have implemented new technologies and put together a cohesive approach to their business continuity and…
Read MoreWith more cryptographic keys to protect, more value in the data being protected by those keys, and proliferating compliance requirements (including those of GDPR, PCI DSS, and…
Read More