night city banner

Cloud Protection & Licensing Blog

Stay up to date with data security best practices and industry news

Select Category
Select Year
  • Select Year
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
Five Hot Security and Privacy Topics You Need To Understand in 2022
Chad Couser
Five Hot Security and Privacy Topics You Need To Understand in 2022

Throughout 2021 Thales hosted several webinars whose purpose was to raise awareness on trending topics around cybersecurity and privacy. Panelists included security…

Read More
Data Privacy and Security: It Takes Two to Tango
Todd Moore
Data Privacy and Security: It Takes Two to Tango

The National Cybersecurity Alliance (NCA) announced earlier this year that they have expanded the Data Privacy Day campaign into…

Read More
How to activate multifactor authentication everywhere
Chitwan Arora
How to activate multifactor authentication everywhere

The impact of not having multifactor authentication (MFA) activated for all users is now well known by enterprises.…

Read More
Understanding Changing Software Delivery Trends and Key Strategies for Growth
Rachel Present Schreter
Understanding Changing Software Delivery Trends and Key Strategies for Growth

State of Software Monetization 2022 The software and software-driven device industry is evolving at breakneck speed, and the stakes have never been higher for…

Read More
It is your data in their cloud, make sure it is secure!
Marcelo Delima
It is your data in their cloud, make sure it is secure!

For modern organizations, digital transformation is a vital imperative, and cloud services offer a proven path to thrive in the digital economy. However, the shared…

Read More
To Err is Human - Three New Year Resolutions for Securing Critical Data
Brian Grant
To Err is Human - Three New Year Resolutions for Securing Critical Data

While the wide-ranging threats to users and devices remain one of the top cybersecurity concerns for business and cybersecurity leadership, just because a weakness exists doesn…

Read More