Posted on 19 December 2013 by Thales DIS
Bring-Your-Own-Identity (BYOI) represents an evolution in authentication schemes by offering a better user experience and security than the use of multiple passwords for different services.
Posted on 18 February 2014 by Thales DIS
Based on the Breach Level Index, this infographic shows the rate at which data records were lost or stolen in 2013 and the source of the breaches.
Posted on 18 March 2014 by Thales DIS
In our six-part series, ‘Securing the Breach’, we will take you on a journey – starting with the current state of data security and how we got here.
Posted on 01 April 2014 by Thales DIS
Find out the three steps that every company should take to mitigate the overall cost and adverse consequences that result from a security breach.
Posted on 16 April 2014 by Thales DIS
In the third installment of Securing the Breach, we take a closer look at the types of data that need encryption, and specifically “data at rest.”
Posted on 17 April 2014 by Thales DIS
The Heartbleed vulnerability once again reinforces the importance of using a hardware security module for cryptographic key storage and management.