Smart mobility and the blockchain
Posted on 04 February 2019 by
Can a consortium blockchain approach allow IoT industry players launch and secure new services such as car-sharing apps?
Posted on 04 February 2019 by
Can a consortium blockchain approach allow IoT industry players launch and secure new services such as car-sharing apps?
Posted on 12 December 2018 by
Data protection is more challenging now than it ever has been. The emergence of virtualization and cloud services, for instance, has made it difficult for organizations to uniformly safeguard their information across their IT environments. At the same time, companies must contend with advanced threats that continue to grow in number and sophistication. Learn how Data Protection on Demand can help organizations with cloud HSM, encryption & key management.
Posted on 20 November 2018 by
Hardware Security Modules (HSM) are vital to the security of today’s cloud-enabled, digital world. They act as trust anchors that protect encryption and the cryptographic infrastructure of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys. Without them, data, transactions and the increasing number of workloads in the cloud […]
Posted on 29 October 2018 by
Learn why data encryption should be a must for organizations. It’s time for a new data security mindset. Gemalto’s 3-step Secure the Breach approach can help your organization secure your sensitive data from cyber-attacks.
Posted on 24 October 2018 by
Explore the dangers of leaving high-value, sensitive information unprotected and learn how a three-step approach against inevitable data breaches with encryption at its core can help your organization.
Posted on 10 October 2018 by
Within this article, learn how a multi-layered security approach will reduce your risk of a data breach. With our 3-step approach, you can reduce your risk to exposing your sensitive data and important data from falling into cybercriminals’ hands.