Thales Trusted Cyber Technologies   Contact Us | Careers

CTO Sessions On Demand: Trusted Data in Motion – Securing Government Communications in the PQC Era

quantum-webcast-od_Oct-2025

Quantum computing threatens to render today’s encryption obsolete, exposing classified data and undermining national security. This session explores h...

Read More

Washington Technology Commentary: Why federal agencies must act now on post-quantum cryptography

wash-tech-quantum-1-tn

Read More

Solution Brief: Thales TCT Post-Quantum Cryptography Implementation

quantun-sb-tn

Download this solution brief to learn about Thales TCT’s Post-Quantum Cryptography Implementation.

Read More

CTO Sessions On Demand: Best Practices for Implementing Quantum-Resistant Security

quantum-webcast-od

Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National Security Memor...

Read More

CTO Sessions Webcast: Best Practices for Data in Transit Encryption

hse-webcast-2024-tn

High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation i...

Read More

Infographic: Thales CV1000 Virtual Encryptor

cv1000-infographic-tn

Download the Thales CV1000 Virtual Encryptor Infographic.

Read More

Video: Thales High Speed Encryptors Demo

Thales TCT Video (1)

Video Courtesy of THales Cloud Protection & Licensing

Read More

Video: Securing 5G Private Networks with Thales High Speed Encryptors

Thales TCT Video (1)

Video Courtesy of Thales Cloud Protection and Licensing

Read More

CTO Sessions Webcast On Demand: Network Encryption Boot Camp – A Guide to Network Encryption from the Core to the Cloud to the Edge

web-tn- hse-boot-camp-webinar

High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation i...

Read More

Solution Brief: Quantum Resistant High Speed Network Encryption

csfc-hse-tn

There is an emerging network encryption strategy that uses a defense-in-depth approach implemented using two nested, independent encryption tunnels to...

Read More