Posted on 09 April 2025 by Yecaneh Aguado
Quantum computing, with its unparalleled processing power, promises to revolutionise technology but also poses a substantial threat to current encryption methods. At Thales, we are committed to anticipating these threats and evolving our products and services to ensure a quantum-safe future. Strengthening Trust through Post-Quantum Cryptography (PQC) Quantum computers have the potential to break the […]
Posted on 27 June 2023 by Mathay Kahraman
Phishing is the most frequently deployed method used by criminals to initiate a cyber attack, according to research from IBM. Phishing is designed to trick users into clicking on links or downloading attachments that either install malware or give unauthorized users access to company systems. With the growth in AI tools recently, phishing attempts are […]
Posted on 04 April 2019 by Todd Moore
It’s been an exciting week for everyone at Thales and Gemalto. The combination of our two companies creates the worldwide leader in digital security, protecting more data, transactions and identities than any other company and enabling tens of thousands of organizations to deliver trusted digital services to billions of individuals around the world. The Leading […]
Posted on 02 April 2019 by Sebastien Cano
Today marks an exciting milestone as Thales and Gemalto become one company. As a result of the combination of these two global leaders in digital security, Thales eSecurity and Gemalto’s Enterprise & Cybersecurity business are joining together as Thales Cloud Protection & Licensing, creating the world leader in cloud, data and software protection. It’s […]
Posted on 04 February 2019 by Didier Benkoël
Can a consortium blockchain approach allow IoT industry players launch and secure new services such as car-sharing apps?
Posted on 20 November 2018 by Thales
Hardware Security Modules (HSM) are vital to the security of today’s cloud-enabled, digital world. They act as trust anchors that protect encryption and the cryptographic infrastructure of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys. Without them, data, transactions and the increasing number of workloads in the cloud […]