Tag: Thales CPL Blog Feed

Around the World with Thales: Our Upcoming Events

Around the World with Thales: Our Upcoming Events madhav Thu, 09/28/2023 – 05:01 <div><p>The summer is long gone, and we are all back to work. However, there will be plenty of opportunity for us all to catch up as the…

Happy Compliance Officer Day!

Happy Compliance Officer Day! madhav Tue, 09/26/2023 – 05:57 <div><p>The summer vacation seems a distant memory and my wife and I are firmly back in the routine of our kids being at school – with the added benefiting of the…

The Clock is Ticking for PCI DSS 4.0 Compliance

The Clock is Ticking for PCI DSS 4.0 Compliance madhav Tue, 09/19/2023 – 05:17 It is essential for any business that stores, processes, and transmits payment card information to comply with the Payment Card Industry Data Security Standard (PCI DSS).…

Grow Revenue, Cross Sell, and Reduce Churn with Sentinel Pulse

Grow Revenue, Cross Sell, and Reduce Churn with Sentinel Pulse madhav Fri, 09/08/2023 – 05:06 If you are a Sentinel entitlements management user, you can find opportunities in the current customer list to grow your revenue, cross-sell, and reduce churn…

How Thales and Red Hat Secure Kubernetes Data in a 5G World

How Thales and Red Hat Secure Kubernetes Data in a 5G World madhav Wed, 08/30/2023 – 07:29 Service providers that operate 5G networks face many challenges related to their highly distributed infrastructure. While Kubernetes presents a promising solution for addressing…

Thales Luna HSMs Secure Digital Transactions of a Prominent Bangladeshi Bank

Thales Luna HSMs Secure Digital Transactions of a Prominent Bangladeshi Bank madhav Tue, 08/15/2023 – 04:57 Over the past ten years, banking and financial institutions worldwide have undergone a significant digital revolution. Innovative technologies have transformed payment transactions, banking processes,…

Maintaining the Optimal Blend for Digital Success

Maintaining the Optimal Blend for Digital Success madhav Tue, 08/15/2023 – 04:57 Operating in an increasingly challenging digital landscape, organizations must maintain a delicate balance between user experience, security, and privacy in every interaction. Customer Identity & Access Management (CIAM)…

Celebrating Infinity Day. To August 8th… and Beyond!

Celebrating Infinity Day. To August 8th… and Beyond! andrew.gertz@t… Tue, 08/08/2023 – 12:49 Infinity Day is a celebration that transcends boundaries, embracing the limitless potential of technology and its impact on our lives. This annual observance, held on August 8th…

Cloud Key Management Solution for Azure, Azure Stack and M365

Cloud Key Management Solution for Azure, Azure Stack and M365 madhav Thu, 08/03/2023 – 05:59 Uncover Your Cybersecurity Blind Spots Cybersecurity is a strategic risk that should be managed at the highest levels of an organization. In fact, the World…

Uncover Your Cybersecurity Blind Spots

Uncover Your Cybersecurity Blind Spots madhav Thu, 08/03/2023 – 05:59 Cybersecurity is a strategic risk that should be managed at the highest levels of an organization. In fact, the World Economic Forum’s Global Risk Report 2023 again ranked wide-spread cybercrime…

How to Meet Phishing-Resistant MFA Requirements

How to Meet Phishing-Resistant MFA Requirements madhav Tue, 08/01/2023 – 05:18 Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It’s a sensible decision to utilize MFA. The bigger question is, what…

How to Meet Phishing-Resistant MFA

How to Meet Phishing-Resistant MFA madhav Tue, 08/01/2023 – 05:18 Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It’s a sensible decision to utilize MFA. The bigger question is, what type…

3 Ways to Protect Smart Devices from Criminal Exploits

3 Ways to Protect Smart Devices from Criminal Exploits madhav Thu, 07/20/2023 – 07:28 When people think of home or business security, they are usually worried about protecting against a physical breaking in via a window or door and a…

The Eternal Sunshine of the Criminal Mind

The Eternal Sunshine of the Criminal Mind madhav Tue, 07/18/2023 – 04:29 Everyone who works in cybersecurity or IT knows the frustration of dealing with relentlessly creative threat actors. Every day it seems, breaking industry news reveals another story about…

World Youth Skills Day 2023: Engaging Youth with Cybersecurity

World Youth Skills Day 2023: Engaging Youth with Cybersecurity madhav Thu, 07/13/2023 – 04:56 In 2014, the United Nations General Assembly declared 15 July as World Youth Skills Day to celebrate the strategic importance of equipping young people with skills…

Managing Complexity, Data Control, and Sovereignty in the Cloud

Managing Complexity, Data Control, and Sovereignty in the Cloud madhav Tue, 07/11/2023 – 05:08 55% of Organizations Feel Managing and Securing Cloud Data is Becoming More Complex Cloud computing has played a transformative role in some of the most significant…

How Thales and Red Hat Secure Kubernetes Data in a 5G World

How Thales and Red Hat Secure Kubernetes Data in a 5G World madhav Mon, 06/26/2023 – 05:03 The Mobile Network Operators (MNOs) that operate 5G mobile broadband networks face many challenges related to their highly distributed infrastructure. While Kubernetes presents…

A Guide to Key Management as a Service

A Guide to Key Management as a Service madhav Wed, 06/14/2023 – 11:29 As companies adopt a cloud-first strategy and high-profile breaches hit the headlines, securing sensitive data has become a paramount business concern. The most effective way to ensure…

What Are the Key Trends in Cybersecurity Right Now?

What Are the Key Trends in Cybersecurity Right Now? madhav Mon, 05/29/2023 – 07:07 Working in a sector as dynamic as cybersecurity, it’s all too rare that we can pause for a moment and reflect on what’s important. Fortunately, I…

The Rise of the Sovereign Cloud

The Rise of the Sovereign Cloud sparsh Thu, 05/25/2023 – 04:04 One of the big ironies about data on the internet is that once the goal of achieving a centreless web of data communication (the internet itself) had been developed…

8 Key Components of a CIAM Platform

8 Key Components of a CIAM Platform sparsh Tue, 05/23/2023 – 04:15 Customer Identity and Access Management (CIAM) is essentially developed to improve the customer experience (CX), ensure the highest level of security, protect customer data, and support the management…

Ransomware – Stop’em Before They Wreak Havoc

Ransomware – Stop’em Before They Wreak Havoc madhav Thu, 05/18/2023 – 06:03 Cybercriminals have been making a run on your data with ransomware attacks over the last decade in increasing frequency. They wreak havoc by bringing critical infrastructures, supply chains,…

How to Maximize Cloud Benefit with Digital Sovereignty

How to Maximize Cloud Benefit with Digital Sovereignty divya Tue, 05/16/2023 – 06:34 Driven by changing worldwide privacy legislation and regulation, digital sovereignty has become a major concern for organizations worldwide. According to the S&P Global Market Intelligence 2023 Data…

Protecting Gig Identities – The 7 CIAM Capabilities You Need

Protecting Gig Identities – The 7 CIAM Capabilities You Need sparsh Thu, 04/20/2023 – 05:54 There is no doubt, the gig economy is growing. In today’s highly connected world, many companies prefer hiring short-term workers and contractors instead of full-time…

Post-Quantum Cryptography (PQC): Three Easy Ways to Prepare

Post-Quantum Cryptography (PQC): Three Easy Ways to Prepare madhav Fri, 04/14/2023 – 06:05 The infamous Y2K “disaster” was successfully averted because people paid heed and prepared well in advance. Likewise, many Post-Quantum Computing (PCQ) security concerns can be addressed ahead…

This Identity Management Day, Go BIG or Go HOME!

This Identity Management Day, Go BIG or Go HOME! madhav Wed, 04/12/2023 – 06:11 Identity and Access Management (IAM) has evolved significantly over the past decade. It almost feels like we’re at an inflection point at the moment. There are…

World Backup Day 2023: Five Essential Cyber Hygiene Tips

World Backup Day 2023: Five Essential Cyber Hygiene Tips madhav Thu, 03/30/2023 – 05:54 World Backup Day, celebrated each year on March 31st, is a day created to promote backing up data from your devices. First observed in 2011, the…

5 Ways CIAM Ensures a Seamless and Secure Customer Experience

5 Ways CIAM Ensures a Seamless and Secure Customer Experience divya Thu, 03/23/2023 – 05:27 In today’s digital-first world, providing customers with trustworthy, hassle-free interactions is critical to business success. A CIAM solution serves as that ‘first door’ between the…

Key Points from the US National Cybersecurity Strategy 2023

Key Points from the US National Cybersecurity Strategy 2023 divya Mon, 03/13/2023 – 15:39 On March 2, the Biden administration released its 2023 National Cybersecurity Strategy, an attempt “to secure the full benefits of a safe and secure digital ecosystem…

You Cannot Secure Your Data by Network Penetration Testing

You Cannot Secure Your Data by Network Penetration Testing divya Thu, 03/09/2023 – 06:05 Organisations continue to experience serious data breaches, often causing harm to their customers, society, and their hard-earned reputations. It would seem obvious from the reported data…

Your Cannot Secure Your Data by Network Penetration Testing

Your Cannot Secure Your Data by Network Penetration Testing divya Thu, 03/09/2023 – 06:05 Organisations continue to experience serious data breaches, often causing harm to their customers, society, and their hard-earned reputations. It would seem obvious from the reported data…

How is CIAM different from IAM?

How is CIAM different from IAM? divya Mon, 03/06/2023 – 06:13 Whether shopping online, working remotely, or ordering a ride, digital identities are at the heart of everything we do online. Widespread cloud adoption, flexible work models, and omnichannel communications…

Europe Leads the Cybersecurity Regulation Dance

Europe Leads the Cybersecurity Regulation Dance divya Thu, 03/02/2023 – 06:58 Europe has emerged as a hub for developing cyber policies, acting to improve software security, and quickly reporting severe breaches. The European Commission has introduced some pretty cutting-edge legislation…

CENTRAL BANK DIGITAL CURRENCIES

CENTRAL BANK DIGITAL CURRENCIES divya Tue, 02/28/2023 – 06:31 CENTRAL BANK DIGITAL CURRENCIES an evolution of money and payments CBDC, or Central Bank Digital Currency, is a trending topic in the financial industry. Let’s examine the basics of CBDC and…

The Pain of Double Extortion Ransomware

The Pain of Double Extortion Ransomware divya Thu, 02/16/2023 – 06:10 Ransomware perpetrators are adopting more sophisticated attack techniques with much success. Attackers are increasingly threatening double and triple extortion in addition to ransom demands, putting more pressure on victims…

How do you secure the Big Game?

How do you secure the Big Game? divya Thu, 02/09/2023 – 10:08 In a matter of days, the world will be watching as the Philadelphia Eagles and the Kansas City Chiefs square off in the much-anticipated Superbowl 57 at State…

How do you secure a Super Bowl?

How do you secure a Super Bowl? divya Thu, 02/09/2023 – 10:08 In a matter of days, the world will be watching as the Philadelphia Eagles and the Kansas City Chiefs square off in the much-anticipated Superbowl 57 at State…

Building a Quantum-Safe Blockchain Today

Building a Quantum-Safe Blockchain Today divya Tue, 01/31/2023 – 06:18 Public-key cryptography is used to establish a distributed consensus of trust, which is essential for financial Blockchain solutions. While the chain itself is relatively secure, the “wallets” at the endpoints…