Thales Trusted Cyber Technologies   Contact Us | Careers

CTO Sessions On Demand: When AI Learns to Breach and Quantum Learns to Decrypt – The Endgame

sandbox-webinar-on-demand

As public and private sectors accelerate AI adoption, they’re deploying it atop cryptographic foundations built for a human-centric world. This ...

Read More

Washington Technology Commentary: Why federal agencies must act now on post-quantum cryptography

wash-tech-quantum-1-tn

Read More

CTO Sessions Webcast On Demand: Intersection of Quantum, AI and Security

ai-quantum-on-demand (1)

Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. Once AI is able to utilize ...

Read More

Solution Brief: Thales TCT Post-Quantum Cryptography Implementation

quantun-sb-tn

Download this solution brief to learn about Thales TCT’s Post-Quantum Cryptography Implementation.

Read More

Washington Technology Commentary: Why post-quantum security planning must start today

wash-tech-quantum-1-tn

Read More

GovLoop Blog Post: Quantum-Safe Encryption: What It Means, and Why Agencies Should Care

govloop-quantum-blog

Read More

On Demand GovLoop Webinar: Taking a Realistic Look at Quantum Computing in Government

govloop-webinar

Quantum computing in government is poised to make an impact. Updates and timelines from the National Quantum Initiative paint a very exciting picture ...

Read More

GovLoop Video: Quantum-Safe Encryption: Understanding the What, Why and How

govloop-quantum-short

Encryption keeps agency data safe, protected from malicious actors. But quantum computing jeopardizes those long-standing encryption algorithms, and t...

Read More

Govloop Video Interview: Quantum-Safe Encryption: What It Means, and Why Agencies Should Care

quantum-interview-1

Watch the video interview between Thales TCT Deputy CTO Gina Scinta and GovLoop to learn why quantum computing poses a unique threat to government age...

Read More

CTO Sessions On Demand: Best Practices for Implementing Quantum-Resistant Security

quantum-webcast-od

Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National Security Memor...

Read More