Posted on 11 March 2013 by Thales
Do you use your mobile phone purely for calling? If so, you’re missing out! The new mobile era has brought us many possibilities, given us more flexibility and shaped our daily habits with the noble mission of making our life easier. However, everything comes at a price. While mobile devices nowadays are enabled to allow […]
Posted on 22 November 2019 by Citlali Tellez
Are biometrics really that powerful? As it turns out, they are. We look at three examples of how the technology can be used to tackle social issues.
Posted on 30 October 2017 by Thales
A previously unknown family of ransomware called Bad Rabbit is targeting organizations primarily based in Russia and Ukraine.
Posted on 28 September 2017 by Sophie Bessin-Py
As the US government proposes new legislation to secure the Internet of Things (IoT), we look at why it could be a good idea.
Posted on 01 August 2017 by Thales
Game of Threats identifies the new data security mindset shifting from breach prevention to breach acceptance and focus on securing the breach. Security controls need to be moved as close to the data and users accessing that data because perimeter security controls do not protect it.
Posted on 16 March 2021 by Florent Abat
How can manufacturers ensure user security and trust in connected cars? Read our blog to find out.