Thales Trusted Cyber Technologies   Contact Us | Careers

White Paper: Quantum Resistant Code Signing Secured by Hardware Security Modules

lms-wp-tn

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant...

Read More

CTO Sessions Webcast On Demand: Building a Root of Trust in How to Secure the Most Sensitive Data

web-tn-hsm-webinar-ondemand- social

Watch a replay of this webinar to learn: Secure critical data and digital identities Support a variety of well-known and emerging cybersecurity use c...

Read More

On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data

web-tn-rot

Government agencies’ digital transformation has vastly increased the complexity of security. Technologies such as cloud computing, AI, IoT, analytics,...

Read More

White Paper: Securing Network-Attached HSMs

securing-netowrk-hsm-wp-tn

In the security world, the phrase ‘secure network’ is often viewed as an oxymoron; experience has demonstrated that once a device is connected to a ne...

Read More

White Paper: Roots of Trust

root-of-trust-wp-tn

The term Root of Trust (RoT) is commonly used in information security circles, but what does it mean? Why do we care? How does it apply to cryptograph...

Read More

Luna Network HSM Product Brief

product-brief-icon

Learn more about Thales TCT’s Luna Network HSM.

Read More