Thales Trusted Cyber Technologies   Contact Us | Careers

On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks

web-tn-sypplychain

Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply chain attacks have increased 78%. By infiltrating a supply c...

Read More

On Demand Webinar: Best Practices for Data Visibility

web-tn-data-visibiity

To recap, during this webinar attendees learned how to develop a data classification strategy that enables you to get a clear understanding of what se...

Read More

On Demand Webinar: Best Practices for Cloud Data Protection

web-tn-cloud-dp

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

On Demand Webinar – Intelligence Community: Cyber Security is National Security

web-tn-intel-community

In January, the National Security Agency issued its first Cybersecurity Year in Review, detailing the agency’s progress in preventing and removing thr...

Read More

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

web-tn-intel-community (1)

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data in their organization. Attendees also learn...

Read More

On Demand Webinar: Fireside Chat: Data Protection for Multi-Domain Operations

web-tn-fireside-chat

The U.S. Military generates data at unprecedented rates, all the time, and in various locations from core data centers to the cloud to the tactical ed...

Read More

On Demand Webinar: Shifting the Mindset from “Breach Prevention” to “Acceptance”

web-tn-breach-acceptance

During this webinar, we discussed what agencies need to do before their networks are compromised. Discussion topics included: Tips for adopting zero ...

Read More

On Demand Webinar: Building a Root of Trust to Secure the Most Sensitive Data

web-tn-rot

Government agencies’ digital transformation has vastly increased the complexity of security. Technologies such as cloud computing, AI, IoT, analytics,...

Read More

On Demand Webinar: Complementing Splunk: Balancing Big Data Benefits & Big Risks

web-tn-splunk

Federal agencies require a simple way to correlate all security-relevant data so they can manage their security posture. Instead of merely watching ev...

Read More

On Demand Webinar: How To Issue Hardware-Based Identity Credentials To Software Robots

web-tn-rpa

During this webinar, attendees learned how Thales Trusted Cyber Technologies’ Luna Credential System introduces a new approach to multi-factor a...

Read More