Thales Trusted Cyber Technologies   Contact Us | Careers

The Underappreciated Tactic of MITRE ATT&CK Framework – Collection

imperva-mitre-webcast-on-demand-2024-social

A Security Engineers Guide to Database Activity Monitoring Databases are key targets for hackers looking to steal data. However, there is insufficient...

Read More

Securing the Future: Navigation Post Quantum Cryptography Standards

pqc-fcw-webinar-tn

As quantum computing advances, initiatives from NIST and CISA are vital for organizations facing emerging cybersecurity challenges. NIST began develop...

Read More

CTO Sessions: Best Practices for Phishing-Resistant MFA: FIDO & PKI

phishing-resistant-mfa-webcast-2024-ondemand-social (1)

With recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is top-of-mind i...

Read More

CTO Sessions: Cloud HSM Best Practices

laas-webcast-2024-on-demand-social

Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to th...

Read More

CTO Sessions Webcast: Best Practices for Data in Transit Encryption

hse-webcast-2024-tn

High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation i...

Read More

CTO Sessions Webcast: How-to Guide for Enhancing HPE Infrastructure Security

hpe-on-demand-webcast-tn

Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys...

Read More

CTO Sessions Webcast: Thales TCT + Imperva Trusted End-to-End Data Security

Copy of 24-imperva-dsf-webcast-social

Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protec...

Read More

CTO Sessions: Quantum-Resistant Code Signing

LMS-webcast-on-demand

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant...

Read More

CTO Sessions: Quantum Resistant Security

replay-24-quantum-webcast-social (1)

Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White Hous...

Read More

CTO Sessions Webcast: Word on the Street – 2024’s Top Tech Trends

24-top-trends-webcast-tn

Buzzword tracking is overwhelming. From AI to Quantum, it can be challenging for federal agencies to stay on top of the latest trends and understand h...

Read More