night city banner

Cybersecurity Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
That’s Right, We are Playing Both Sides of the Key Management Game:
Charles Goldberg
That’s Right, We Are Playing Both Sides Of The Key Management Game:

Thales both giveth and taketh Bring Your Own Keys (BYOK) There is no longer denying that encryption is a hot topic. Encryption is everywhere. We hear about…

Read More
When It Comes to a Data Breach, How Do You Want to Be Notified?
When It Comes To A Data Breach, How Do You Want To Be Notified?

August is two-thirds of the way through the year, and we have already seen a number of serious, far-reaching data breaches making headlines, some occurred in 2018, and some…

Read More
Three Reasons You Should Treat Applications As Machine Identities In Your Security Strategy

This article was originally featured as a guest post on…

Read More
Understanding keys is key to understanding
Eric Wolff
Understanding Keys Is Key To Understanding

The newest CipherTrust Cloud Key Manager capability …

Read More
To Go Native, Or Not to Go Native. A Cautionary Tale About Database Encryption
Thales
To Go Native, Or Not To Go Native. A Cautionary Tale About Database Encryption

Enterprise databases house some of the most highly-sensitive, tightly-regulated data—the very data that is sought after by malicious insiders and external attackers. As a…

Read More
Federal Agency Data is Under Siege
Nick Jovanovic
Federal Agency Data Is Under Siege

Originally Featured in Global Military Communications Magazine’s June/July Issue With more than 65,000 employees in 56 countries, Thales is a global leader…

Read More