Category: Enterprise

How to Safeguard Mobile Connectivity in a Post-Quantum Environment

Quantum computing, with its unparalleled processing power, promises to revolutionise technology but also poses a substantial threat to current encryption methods. At Thales, we are committed to anticipating these threats and evolving our products and services to ensure a quantum-safe future.  Strengthening Trust through Post-Quantum Cryptography (PQC)  Quantum computers have the potential to break the […]

How to make your phishing campaign a success

Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading attachments that either install malware or give unauthorized users access to company systems.   With the growth in AI tools recently, phishing attempts are […]

A New Leader in Data Protection

It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital security, protecting more data, transactions and identities than any other company and enabling tens of thousands of organizations to deliver trusted digital services to billions of individuals around the world. The Leading […]

Leadership in Digital Security

  Today marks an exciting milestone as Thales and Gemalto become one company. As a result of the combination of these two global leaders in digital security, Thales eSecurity and Gemalto’s Enterprise & Cybersecurity business are joining together as Thales Cloud Protection & Licensing, creating the world leader in cloud, data and software protection. It’s […]

Choosing the Right Cloud HSM

Hardware Security Modules (HSM) are vital to the security of today’s cloud-enabled, digital world. They act as trust anchors that protect encryption and the cryptographic infrastructure of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys. Without them, data, transactions and the increasing number of workloads in the cloud […]