Thales Trusted Cyber Technologies   Contact Us | Careers

Cyber EO Compliance Video Series – Part 5 – Securing Cloud Deployments

Thales TCT Video (1)

Part 5 of this video series based on a recent Thales TCT webinar discusses how to secure cloud deployments. Government agencies should focus on implem...

Read More

On Demand Webinar: Getting to Compliance with the National Security Memo on Cybersecurity

Thales TCT webinar

On January 19, 2022, the White House issued National Security Memorandum 8 (NSM) to improve the cybersecurity of National Security, Department of Defe...

Read More

Thales TCT Solutions for the NSM on Improving Cybersecurity of NSS Solution Brief

solution-brief-icon

Learn more about our solutions.

Read More

Thales TCT Solutions for White House Executive Order on Cybersecurity

solution-brief-icon

Learn how Thales TCT’s addresses requirements in this EO.

Read More

Thales TCT Luna HSMs for Commercial Solutions for Classified (CSfC) Solution Brief

solution-brief-icon

With a long history of securing the private key of Certified Authorities, HSMs are a perfect fit into every CSfC solution that uses CAs. Use of an HSM...

Read More

White Paper: NIST 800-57 Recommendations for Key Management Requirements Analysis

nist-800-57-wp-tn

The National Institute of Standards and Technology (NIST) Special Publication (SP) 800-57, Recommendations for Key Management Part 1 (Rev 5) provides ...

Read More

White Paper: Top Five Ways to Address Requirements in National Security Memo on Improving Cybersecurity of National Security Systems

nsm-wp-tn

This white paper discusses best security practices associated with the aforementioned key components of the NSM. It additionally details how to implem...

Read More

White Paper: CJIS Data-in-Transit Encryption Standards

cjis-wp-tn

Learn How to Address Your Criminal Justice Information Services Security Policy Requirements Effectively.

Read More

White Paper: Continuous Diagnostics and Mitigation: Data Protection & Assurance

cdm-wp-tn

The Continuous Diagnostics and Mitigation (CDM) program was established by Congress mandating the Department of Homeland Security (DHS) to establish a...

Read More

White Paper: Best Practices for Implementing the White House Executive Order on Improving the Nation’s Cybersecurity Infrastructure

wh-eo-wp-tn

The Executive Order underscores the importance of protecting the Federal Government’s “computer systems, whether they are cloud-based, on-premises, or...

Read More