Category: Thales CPL Blog Feed

Cyber Security Awareness Month – Answering Google’s Most Commonly Asked Questions

< div>Cyber Security Awareness Month – Answering Google’s Most Commonly Asked Questions madhav Wed, 10/18/2023 – 05:25 <div><p>This month is <a href=”https://staysafeonline.org/programs/cybersecurity-awareness-month/” target=”_blank” rel=”noopener”>Cyber Security Awareness Month</a>, highlighting how far security education needs to go in order to enable a…

Three Easy Ways to Improve DevSecOps with Thales and Red Hat

< div>Three Easy Ways to Improve DevSecOps with Thales and Red Hat divya Tue, 10/17/2023 – 14:47 <div><p>For many <a href=”https://www.infoworld.com/article/3215275/what-is-devops-transforming-software-development.html” target=”_blank” rel=”noopener”>DevOps</a> enthusiasts, the need to insert security considerations directly into the development cycle was often overlooked. After all,…

Protect Your Organization from Cybercrime-as-a-Service Attacks

< div>Protect Your Organization from Cybercrime-as-a-Service Attacks madhav Thu, 10/12/2023 – 04:53 <div><p>In years gone by, only large enterprises needed to be concerned with cybercrime. For <a href=”https://cpl.thalesgroup.com/blog/identity-data-protection/the-eternal-sunshine-cyber-criminal-mind”>cybercriminals</a>, small to medium-sized businesses (SMBs) weren’t worth attacking; the few individuals capable…

The Impact of AI-assisted Call Spoofing and What We Can Do About It

The Impact of AI-assisted Call Spoofing and What We Can Do About It madhav Thu, 10/05/2023 – 05:12 <div><p>It is widely discussed that <a href=”https://cpl.thalesgroup.com/blog/identity-data-protection/the-eternal-sunshine-cyber-criminal-mind”>cyber criminals</a> look for the easiest way to maximize profit. They are also keen to capitalize…

Cybersecurity Awareness Month 2023 – What it is and why we should be aware

Cybersecurity Awareness Month 2023 – What it is and why we should be aware madhav Tue, 10/03/2023 – 05:33 <div><p>The inception of <a href=”https://staysafeonline.org/programs/cybersecurity-awareness-month/” target=”_blank” rel=”noopener”>Cybersecurity Awareness Month</a> in 2004 came at a critical juncture in our technological history. As…

Happy Compliance Officer Day!

Happy Compliance Officer Day! madhav Tue, 09/26/2023 – 05:57 <div><p>The summer vacation seems a distant memory and my wife and I are firmly back in the routine of our kids being at school – with the added benefiting of the…

The Clock is Ticking for PCI DSS 4.0 Compliance

The Clock is Ticking for PCI DSS 4.0 Compliance madhav Tue, 09/19/2023 – 05:17 It is essential for any business that stores, processes, and transmits payment card information to comply with the Payment Card Industry Data Security Standard (PCI DSS).…

How Thales and Red Hat Secure Kubernetes Data in a 5G World

How Thales and Red Hat Secure Kubernetes Data in a 5G World madhav Wed, 08/30/2023 – 07:29 Service providers that operate 5G networks face many challenges related to their highly distributed infrastructure. While Kubernetes presents a promising solution for addressing…

Maintaining the Optimal Blend for Digital Success

Maintaining the Optimal Blend for Digital Success madhav Tue, 08/15/2023 – 04:57 Operating in an increasingly challenging digital landscape, organizations must maintain a delicate balance between user experience, security, and privacy in every interaction. Customer Identity & Access Management (CIAM)…

Celebrating Infinity Day. To August 8th… and Beyond!

Celebrating Infinity Day. To August 8th… and Beyond! andrew.gertz@t… Tue, 08/08/2023 – 12:49 Infinity Day is a celebration that transcends boundaries, embracing the limitless potential of technology and its impact on our lives. This annual observance, held on August 8th…

Uncover Your Cybersecurity Blind Spots

Uncover Your Cybersecurity Blind Spots madhav Thu, 08/03/2023 – 05:59 Cybersecurity is a strategic risk that should be managed at the highest levels of an organization. In fact, the World Economic Forum’s Global Risk Report 2023 again ranked wide-spread cybercrime…

How to Meet Phishing-Resistant MFA Requirements

How to Meet Phishing-Resistant MFA Requirements madhav Tue, 08/01/2023 – 05:18 Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It’s a sensible decision to utilize MFA. The bigger question is, what…

How to Meet Phishing-Resistant MFA

How to Meet Phishing-Resistant MFA madhav Tue, 08/01/2023 – 05:18 Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It’s a sensible decision to utilize MFA. The bigger question is, what type…

The Eternal Sunshine of the Criminal Mind

The Eternal Sunshine of the Criminal Mind madhav Tue, 07/18/2023 – 04:29 Everyone who works in cybersecurity or IT knows the frustration of dealing with relentlessly creative threat actors. Every day it seems, breaking industry news reveals another story about…

How Thales and Red Hat Secure Kubernetes Data in a 5G World

How Thales and Red Hat Secure Kubernetes Data in a 5G World madhav Mon, 06/26/2023 – 05:03 The Mobile Network Operators (MNOs) that operate 5G mobile broadband networks face many challenges related to their highly distributed infrastructure. While Kubernetes presents…

A Guide to Key Management as a Service

A Guide to Key Management as a Service madhav Wed, 06/14/2023 – 11:29 As companies adopt a cloud-first strategy and high-profile breaches hit the headlines, securing sensitive data has become a paramount business concern. The most effective way to ensure…

What Are the Key Trends in Cybersecurity Right Now?

What Are the Key Trends in Cybersecurity Right Now? madhav Mon, 05/29/2023 – 07:07 Working in a sector as dynamic as cybersecurity, it’s all too rare that we can pause for a moment and reflect on what’s important. Fortunately, I…

The Rise of the Sovereign Cloud

The Rise of the Sovereign Cloud sparsh Thu, 05/25/2023 – 04:04 One of the big ironies about data on the internet is that once the goal of achieving a centreless web of data communication (the internet itself) had been developed…

8 Key Components of a CIAM Platform

8 Key Components of a CIAM Platform sparsh Tue, 05/23/2023 – 04:15 Customer Identity and Access Management (CIAM) is essentially developed to improve the customer experience (CX), ensure the highest level of security, protect customer data, and support the management…

Ransomware – Stop’em Before They Wreak Havoc

Ransomware – Stop’em Before They Wreak Havoc madhav Thu, 05/18/2023 – 06:03 Cybercriminals have been making a run on your data with ransomware attacks over the last decade in increasing frequency. They wreak havoc by bringing critical infrastructures, supply chains,…

How to Maximize Cloud Benefit with Digital Sovereignty

How to Maximize Cloud Benefit with Digital Sovereignty divya Tue, 05/16/2023 – 06:34 Driven by changing worldwide privacy legislation and regulation, digital sovereignty has become a major concern for organizations worldwide. According to the S&P Global Market Intelligence 2023 Data…

Post-Quantum Cryptography (PQC): Three Easy Ways to Prepare

Post-Quantum Cryptography (PQC): Three Easy Ways to Prepare madhav Fri, 04/14/2023 – 06:05 The infamous Y2K “disaster” was successfully averted because people paid heed and prepared well in advance. Likewise, many Post-Quantum Computing (PCQ) security concerns can be addressed ahead…

This Identity Management Day, Go BIG or Go HOME!

This Identity Management Day, Go BIG or Go HOME! madhav Wed, 04/12/2023 – 06:11 Identity and Access Management (IAM) has evolved significantly over the past decade. It almost feels like we’re at an inflection point at the moment. There are…

5 Ways CIAM Ensures a Seamless and Secure Customer Experience

5 Ways CIAM Ensures a Seamless and Secure Customer Experience divya Thu, 03/23/2023 – 05:27 In today’s digital-first world, providing customers with trustworthy, hassle-free interactions is critical to business success. A CIAM solution serves as that ‘first door’ between the…

You Cannot Secure Your Data by Network Penetration Testing

You Cannot Secure Your Data by Network Penetration Testing divya Thu, 03/09/2023 – 06:05 Organisations continue to experience serious data breaches, often causing harm to their customers, society, and their hard-earned reputations. It would seem obvious from the reported data…

Your Cannot Secure Your Data by Network Penetration Testing

Your Cannot Secure Your Data by Network Penetration Testing divya Thu, 03/09/2023 – 06:05 Organisations continue to experience serious data breaches, often causing harm to their customers, society, and their hard-earned reputations. It would seem obvious from the reported data…

How is CIAM different from IAM?

How is CIAM different from IAM? divya Mon, 03/06/2023 – 06:13 Whether shopping online, working remotely, or ordering a ride, digital identities are at the heart of everything we do online. Widespread cloud adoption, flexible work models, and omnichannel communications…

Europe Leads the Cybersecurity Regulation Dance

Europe Leads the Cybersecurity Regulation Dance divya Thu, 03/02/2023 – 06:58 Europe has emerged as a hub for developing cyber policies, acting to improve software security, and quickly reporting severe breaches. The European Commission has introduced some pretty cutting-edge legislation…

CENTRAL BANK DIGITAL CURRENCIES

CENTRAL BANK DIGITAL CURRENCIES divya Tue, 02/28/2023 – 06:31 CENTRAL BANK DIGITAL CURRENCIES an evolution of money and payments CBDC, or Central Bank Digital Currency, is a trending topic in the financial industry. Let’s examine the basics of CBDC and…

The Pain of Double Extortion Ransomware

The Pain of Double Extortion Ransomware divya Thu, 02/16/2023 – 06:10 Ransomware perpetrators are adopting more sophisticated attack techniques with much success. Attackers are increasingly threatening double and triple extortion in addition to ransom demands, putting more pressure on victims…

How do you secure the Big Game?

How do you secure the Big Game? divya Thu, 02/09/2023 – 10:08 In a matter of days, the world will be watching as the Philadelphia Eagles and the Kansas City Chiefs square off in the much-anticipated Superbowl 57 at State…

How do you secure a Super Bowl?

How do you secure a Super Bowl? divya Thu, 02/09/2023 – 10:08 In a matter of days, the world will be watching as the Philadelphia Eagles and the Kansas City Chiefs square off in the much-anticipated Superbowl 57 at State…

Building a Quantum-Safe Blockchain Today

Building a Quantum-Safe Blockchain Today divya Tue, 01/31/2023 – 06:18 Public-key cryptography is used to establish a distributed consensus of trust, which is essential for financial Blockchain solutions. While the chain itself is relatively secure, the “wallets” at the endpoints…