Thales Trusted Cyber Technologies   Contact Us | Careers

CTO Sessions Webcast On Demand: Intersection of Quantum, AI and Security

ai-quantum-on-demand (1)

Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. Once AI is able to utilize ...

Read More

CTO Session Webcast On Demand: Intersection of AI and Security

ai-march-on-demand

Artificial intelligence (AI) is rapidly transforming our world, from the way we work to the way we interact with machines. But, with this immense powe...

Read More

Washington Technology Commentary: Why post-quantum security planning must start today

wash-tech-quantum-1-tn

Read More

GovLoop Blog Post: Quantum-Safe Encryption: What It Means, and Why Agencies Should Care

govloop-quantum-blog

Read More

CTO Sessions On Demand: Best Practices for Implementing Quantum-Resistant Security

quantum-webcast-od

Quantum computing’s potential computational power will render today’s widely-deployed encryption algorithms obsolete. Both the National Security Memor...

Read More

CTO Sessions On Demand: 2024 Data Threat Report – Federal Edition Webcast

dtr-webinar-on-demand

The 2024 Thales Data Threat Report highlights the unique security challenges faced by U.S. Federal agencies. This report reveals new cybersecurity str...

Read More

The Underappreciated Tactic of MITRE ATT&CK Framework – Collection

imperva-mitre-webcast-on-demand-2024-social

A Security Engineers Guide to Database Activity Monitoring Databases are key targets for hackers looking to steal data. However, there is insufficient...

Read More

Securing the Future: Navigation Post Quantum Cryptography Standards

pqc-fcw-webinar-tn

As quantum computing advances, initiatives from NIST and CISA are vital for organizations facing emerging cybersecurity challenges. NIST began develop...

Read More

CTO Sessions: Best Practices for Phishing-Resistant MFA: FIDO & PKI

phishing-resistant-mfa-webcast-2024-ondemand-social (1)

With recent vulnerabilities such as EUCLEAK and Executive Order 14028 deadlines, phishing-resistant Multi-Factor Authentication (MFA) is top-of-mind i...

Read More

2024 Thales Data Threat Report Federal Edition

2024-DTR-Email-Mockup-USFED

In this paper, we share key findings from the 2024 Thales Data Threat Report (DTR) focused on USFED agencies and organizations, examining the differen...

Read More