The Ultimate Cheat Sheet on Strong Authentication – Part 2
Posted on 14 April 2016 by
Part 2 of our strong authentication cheat sheet covers how one-time passwords are generated, what OATH authentication is, and more.
Posted on 14 April 2016 by
Part 2 of our strong authentication cheat sheet covers how one-time passwords are generated, what OATH authentication is, and more.
Posted on 25 April 2016 by
In this GDPR summary, find out what the regulation requires and how it emphasizes the use of encryption and other data protection best practices… or else.
Posted on 17 June 2016 by
Learn the smart grid security issues that must be addressed to realize the benefits this advancement offers as well as the goals of smart grid security.
Posted on 20 September 2016 by
There were 974 data breaches in the first 6 months of 2016. And that’s not even the worst 2016 data breach statistics. Learn everything you should know about 2016’s security breaches.
Posted on 20 July 2018 by
A government healthcare group database in Singapore suffered a data breach that compromised the personal information of 1.5 million people. On 4 July 2018, investigators with Integrated Health Information System (IHiS) detected strange activity on one of the IT databases owned by SingHealth, Singapore’s largest group of healthcare institutions. The administrators responded by implementing additional […]
Posted on 23 May 2019 by
When your cryptographic keys are already secured using the HSMs from the leading data protection provider in industry, and you don’t want to downgrade your security for your Cloud First plans: you have a choice. That choice is Thales – the SafeNet HSMs you know and trust. For hybrid and multicloud data protection – available in the cloud as SafeNet Data Protection On Demand, and on-premises as SafeNet Luna HSMs.