Posted on 27 April 2015 by Thales DIS
If there is one thing we can take away from this year’s RSA Conference it’s this: We do not have a technology problem, we have a mindset problem. There are plenty of very good security technologies available today, and walking around the RSA Conference show floor you really got a sense of the sheer volume […]
Posted on 15 May 2015 by Thales DIS
In his podcast recorded by Help Net Security at RSA this year, you’ll learn how the data security changes in the last 5 years have led the infosec industry to where it is today.
Posted on 03 June 2015 by Thales DIS
This year’s Gartner Security & Risk Management Summit, which will be held just outside Washington, DC from June 8 to 11, has speaking sessions from 45 Gartner analysts on so many great topics that any individual attending will be hard pressed to soak it all in. Following last year’s attendance, this event has become Gartner’s […]
Posted on 15 June 2015 by Rana Gupta
Recently I was pleased to emcee Gemalto’s second annual APAC Cipher Partner Summit in Phuket, Thailand with attendance from more than 110 partners from around the region. For three days we shared presentations on our data and identity protection solutions, exchanged ideas and best practices, networked with peers, and celebrated our valuable collaboration together on […]
Posted on 07 October 2015 by Jennifer Dean
While Bring Your Own Device continues to grow at a prolific rate, IT teams face the challenge of securing and enabling access to the enterprise ecosystem via a wide range of devices from different manufacturers. So how does corporate IT deal with the BYOD phenomenon while ensuring the security of corporate networks and data?
Posted on 08 February 2016 by Thales DIS
If you will be at the RSA Conference at the Moscone Center in San Francisco, CA from February 29th – March 4th, make sure to stop by the Gemalto booth, #4108, in North Hall to learn about how we can help your organization Secure the Breach in three steps – encrypting your sensitive data, managing your encryption keys, and regulating access to your data and applications.