Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to th...
Read MoreCloud Security Alliance best practices require that keys be stored and managed outside of the cloud service provider and the associated encryption ope...
Read MoreOn the first installment of Thales TCT’s CTO Sessions Webcast Series for 2023, Thales TCT’s CTO Office shared predictions on the top 5 tech trends for...
Read MoreCloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...
Read MoreIn this video, Jermaine from Thales TCT demonstrates protecting AWS S3 buckets with AWS KMS vs Transparent Encryption Cloud Object Storage S3 from Tha...
Read MoreCloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...
Read MoreCloud consumers face a choice: using the cloud service provider’s (CSP) encryption or bringing their own encryption. Cloud providers make their native...
Read MoreLearn how Thales TCT integrates with Microsoft Azure for Advanced Data Protection
Read MoreSecuring data in the cloud properly requires that data owners own—and can prove that they own—their data, from inception to deletion. That means that ...
Read MoreThis white paper discusses best security practices associated with the aforementioned key components of the NSM. It additionally details how to implem...
Read More