On the first installment of Thales TCT’s CTO Sessions Webcast Series for 2023, Thales TCT’s CTO Office shared predictions on the top 5 tech trends for...
Read MoreCloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...
Read MoreIn this video, Jermaine from Thales TCT demonstrates protecting AWS S3 buckets with AWS KMS vs Transparent Encryption Cloud Object Storage S3 from Tha...
Read MoreCloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...
Read MoreIs the glass half-full or half-empty? We’ve been publishing the Data Threat Report, and some form of the above statistics, for many years. From the op...
Read MoreLearn how Thales TCT integrates with Microsoft Azure for Advanced Data Protection
Read MoreSecuring data in the cloud properly requires that data owners own—and can prove that they own—their data, from inception to deletion. That means that ...
Read MoreThis white paper discusses best security practices associated with the aforementioned key components of the NSM. It additionally details how to implem...
Read MoreLearn more about CipherTrust Cloud Key Manager.
Read MoreThe Executive Order underscores the importance of protecting the Federal Government’s “computer systems, whether they are cloud-based, on-premises, or...
Read More