Posted on 20 July 2012 by Thales
This week has seen yet another study highlighting the inherent dangers of securing your personal information with just a password. According to research from Experian, the average internet user in the UK has just five different passwords, despite having 26 different online accounts. Indeed, a quarter use just one password for most of their logins. […]
Posted on 20 November 2018 by Thales
Hardware Security Modules (HSM) are vital to the security of today’s cloud-enabled, digital world. They act as trust anchors that protect encryption and the cryptographic infrastructure of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys. Without them, data, transactions and the increasing number of workloads in the cloud […]
Posted on 21 August 2012 by Thales
As a child, I often wondered whether my thoughts were visible to others in a cloud above my head. (I had obviously been reading too many comics where dialogue and monologues are depicted as such.) Thankfully the wisdom of age has shown this not to be true, but such an invasion of your privacy is […]
Posted on 18 February 2014 by Thales
Based on the Breach Level Index, this infographic shows the rate at which data records were lost or stolen in 2013 and the source of the breaches.
Posted on 18 March 2014 by Thales
In our six-part series, ‘Securing the Breach’, we will take you on a journey – starting with the current state of data security and how we got here.
Posted on 24 July 2012 by Thales
In the latest of our posts looking at results of our recent CIO Research project we’re focusing the debate of security versus convenience. Many still consider the two to be mutually exclusive, but does this necessarily need to be the case? I blogged on this topic back in March, following a similar article by Per […]