Posted on 20 November 2018 by
Hardware Security Modules (HSM) are vital to the security of today’s cloud-enabled, digital world. They act as trust anchors that protect encryption and the cryptographic infrastructure of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys. Without them, data, transactions and the increasing number of workloads in the cloud […]
Posted on 25 April 2016 by
In this GDPR summary, find out what the regulation requires and how it emphasizes the use of encryption and other data protection best practices… or else.
Posted on 23 June 2016 by
Network security could have prevented the MongoDB data breach. Are you securing your data? Learn the 3 steps to avoid this security risk.
Posted on 21 May 2015 by
There is no question that technology advancements in mobile payments and wearables are having an impact on the payments industry. Consumers are turning to smartphones and wearables, like festival wristbands and smartwatches, to manage their money in a quicker, more efficient way. Easy, “tap & go” contactless payments are also on the rise. Just last […]
Posted on 24 October 2018 by
Explore the dangers of leaving high-value, sensitive information unprotected and learn how a three-step approach against inevitable data breaches with encryption at its core can help your organization.
Posted on 06 November 2017 by
Gemalto is excited to announce the launch of SafeNet Data Protection on Demand, our new data security-as-a-service platform to help you deliver cost effective encryption, hardware security modules and key management services in the cloud to protect sensitive and regulated data.