- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![How FIDO 2 authentication can help achieve regulatory compliance](/sites/default/files/content/blog/field_image/2021-06/fido2-authentication-blog-featured-image.jpg)
Businesses are governed by an increasingly complex network of regulations, jurisdictions, and standards which dictate security and privacy requirements. One common denominator…
Read More![Insights from Sentinel Insights Blog](/sites/default/files/content/blog/field_image/2021-06/blog-insights-from-sentinel-insights.jpg)
At Sentinel Insights 2021, the Thales flagship software monetization conference, industry-leading experts shared their insights on why and how innovative software licensing and…
Read More![Stop the network – I want to get off](/sites/default/files/content/blog/field_image/2021-06/stop-the-network-blog-featured-image.jpg)
Data is moving across the network all the time, to and from data centers to headquarters, branch offices, across on-premises, and virtualized networks, to the cloud and back…
Read More![Enhanced Privacy and Confidentiality using Thales and Google Workspace Client side-encryption](/sites/default/files/content/blog/field_image/2021-06/google-workspace_0.jpg)
Thales is expanding its partnership with Google Workspace to enhance…
Read More![How Can You Protect Critical Infrastructure from Ransomware Attacks](/sites/default/files/content/blog/field_image/2021-06/how-to-protect-critical-infrastructure.jpg)
Another week, another ransomware attack. This time an attack on JBS,…
Read More![Secure Public Key Infrastructure (PKI) Critical to STIR/SHAKEN](/sites/default/files/content/blog/field_image/2021-06/secure-public-key-infracture.jpg)
We are all too familiar with answering a call only to be greeted with a loud horn followed by the words “you’ve won a cruise”. Sometimes we may not recognize the phone number,…
Read More