The 2024 Thales Data Threat Report highlights the unique security challenges faced by U.S. Federal agencies. This report reveals new cybersecurity str...
Read MoreA Security Engineers Guide to Database Activity Monitoring Databases are key targets for hackers looking to steal data. However, there is insufficient...
Read MoreAs quantum computing advances, initiatives from NIST and CISA are vital for organizations facing emerging cybersecurity challenges. NIST began develop...
Read MoreWith recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is top-of-mind i...
Read MoreIn this paper, we share key findings from the 2024 Thales Data Threat Report (DTR) focused on USFED agencies and organizations, examining the differen...
Read MoreGina Scinta, the deputy CTO and security evangelist at Thales Trusted Cyber Technologies, said agencies need to recognize the benefits, risk of quantu...
Read MoreAlthough federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to th...
Read MoreHigh speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation i...
Read MoreSensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys...
Read More