night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
10 Best Practices for Centralized Encryption Key Management
Nisha Amthul
10 Best Practices for Centralized Encryption Key Management

The security of cryptographic processes is dependent on the security of the cryptographic keys used to encrypt the data. If the keys used to encrypt or tokenize data are stolen…

Read More
Accelerate Partner Network is a Cornerstone for Thales Go-to-Market Strategy
Dave Jordan
Accelerate Partner Network is a Cornerstone for Thales Go-to-Market Strategy

In February of this year, we launched a new partner program, the Thales Accelerate Partner Network (Accelerate), for our cloud protection and licensing business. The program…

Read More
Security for Internet of Things Device Manufacturers
Welland Chu
Security for Internet of Things Device Manufacturers

It’s my privilege to share my insights on IoT security that were published recently in the esteemed ISACA Journal on June 3 (available only to registered members…

Read More
Verizon DBIR 2020: Stolen Credentials Pave the Way for Security Breaches
Tina Stewart
Verizon DBIR 2020: Stolen Credentials Pave the Way for Security Breaches

The more we know about the threats we face, the better our chances of keeping our data secure and our business name out of the headlines. This is exactly the purpose of the…

Read More
Managing Data Security in Times of Crisis for Financial Institutions
Ashesh Thanawala
Managing Data Security in Times of Crisis for Financial Institutions

In an unprecedented global crisis such as COVID-19, organisations that have implemented new technologies and put together a cohesive approach to their business continuity and…

Read More
Why centralized key management is critical in the age of digital transformation
Nisha Amthul
Why centralized key management is critical in the age of digital transformation

With more cryptographic keys to protect, more value in the data being protected by those keys, and proliferating compliance requirements (including those of GDPR, PCI DSS, and…

Read More