Thales Trusted Cyber Technologies   Contact Us | Careers

The Underappreciated Tactic of MITRE ATT&CK Framework – Collection

imperva-mitre-webcast-on-demand-2024-social

A Security Engineers Guide to Database Activity Monitoring Databases are key targets for hackers looking to steal data. However, there is insufficient...

Read More

Securing the Future: Navigation Post Quantum Cryptography Standards

pqc-fcw-webinar-tn

As quantum computing advances, initiatives from NIST and CISA are vital for organizations facing emerging cybersecurity challenges. NIST began develop...

Read More

CTO Sessions: Best Practices for Phishing-Resistant MFA: FIDO & PKI

phishing-resistant-mfa-webcast-2024-ondemand-social (1)

With recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is top-of-mind i...

Read More

CTO Sessions: Cloud HSM Best Practices

laas-webcast-2024-on-demand-social

Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to th...

Read More

CTO Sessions Webcast: How-to Guide for Enhancing HPE Infrastructure Security

hpe-on-demand-webcast-tn

Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys...

Read More

CTO Sessions Webcast: Thales TCT + Imperva Trusted End-to-End Data Security

Copy of 24-imperva-dsf-webcast-social

Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protec...

Read More

CTO Sessions: Quantum-Resistant Code Signing

LMS-webcast-on-demand

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant...

Read More

CTO Sessions: Quantum Resistant Security

replay-24-quantum-webcast-social (1)

Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White Hous...

Read More

CTO Sessions Webcast: Word on the Street – 2024’s Top Tech Trends

24-top-trends-webcast-tn

Buzzword tracking is overwhelming. From AI to Quantum, it can be challenging for federal agencies to stay on top of the latest trends and understand h...

Read More

CTO Sessions On Demand Webcast: Everything You Need to Know About Phishing-Resistant MFA

mfa-webcast-replay-tn

Without secure, enterprise-managed identity systems, adversaries can take over user accounts and gain a foothold in an agency to steal data or launch ...

Read More