Skip Navigation


October 29, 2021
Government Computer News
According to a study from Cybersecurity Ventures, ransomware attacks happen every 11 seconds.
August 31, 2021
Washington Technology
With some deadlines already having arrived and others looming, the May 2021 “Executive Order on Improving the Nation’s Cybersecurity” has IT professionals taking a hard look at security measures ranging from Zero Trust to multi-factor authentication
August 2, 2021
Government Computer News
It’s no surprise that the past year has seen increased attention in network security. The pandemic-driven growth in telework has brought with it growing security threats, and the continuing rise of ransomware attacks has agencies taking a hard look at their security protocols.
May 24, 2021
Government Computer News
Despite recent unverified claims that DarkSide, the ransomware hacking operation responsible for the Colonial Pipeline attack, has dismantled its operations, the incident reinforces one important point for government IT managers: If data is not encrypted, bad actors will do it themselves, and agencies will end up paying for it.
May 17, 2021
Intelligence Community News
We want to think that we’ve made our IT systems relatively impervious to ransomware attacks, but trends are showing otherwise. Rather than focusing on only preventing breaches, we have to consider the importance of file encryption so data is worthless even if the network is compromised.
April 30, 2021
Government Computer News
If the ongoing reporting and scorecards for the Federal Information Technology Acquisition Reform Act have proved anything over the past several years, it’s that many agencies have had trouble quantifying sensitive data -- where in their infrastructure it is located, who can access it and how susceptible it may be to cyber threats.
April 28, 2021
Carahsoft Community
A supply chain attack aims to damage an organization by targeting less secure elements in its supply network. The initial victim becomes a steppingstone to infiltrate other networks. Exploiting a service provider’s data supply chain or traditional manufacturer supply chain has been the objective in many recent major data breaches.
April 19, 2021
Thales TCT
Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced that its Luna T-Series Hardware Security Modules (HSMs) have received Federal Information Processing Standards (FIPS) 140-2 Level 3 validation from the National Institution of Standards and Technology (NIST).
April 13, 2021
Intelligence Community News
Let’s take a look Zero Trust, and how a strategy based on its principles can help achieve security in a post-perimeter environment. In particular, we’ll address the NIST Special Publication on Zero Trust, and consider ways to implement an effective identity-centric Zero Trust architecture.
April 1, 2021
Thales TCT
Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced the appointment of Lloyd Mitchell as the company’s new President. Mr. Mitchell will focus on expanding the company’s portfolio of data security products, creating an innovative work environment, and establishing Thales TCT as a leader in the U.S. Federal market for providing high quality products and world class customer support.

Thales TCT Locations

3465 Box Hill Corporate Center Drive
Suite D
Abingdon, MD 21009
Glen Burnie Office:
504 McCormick Dr., Suites S&T
International Trade Center
Glen Burnie, MD 21061


Interested in Joining the Thales TCT Team?

Learn more about career opportunities at Thales TCT Careers

Connect with us

Learn more about our products, solutions and services Contact Thales TCT

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.