Thales Trusted Cyber Technologies   Contact Us | Careers

2024 Thales Data Threat Report Federal Edition

2024-DTR-Email-Mockup-USFED

In this paper, we share key findings from the 2024 Thales Data Threat Report (DTR) focused on USFED agencies and organizations, examining the differen...

Read More

FedNewsNetwork Commentary: Preparing for the intersection of AI, quantum computing

fnn-tn

Gina Scinta, the deputy CTO and security evangelist at Thales Trusted Cyber Technologies, said agencies need to recognize the benefits, risk of quantu...

Read More

CTO Sessions: Cloud HSM Best Practices

laas-webcast-2024-on-demand-social

Although federal agencies are deploying cloud solutions at a rapid pace, they are often hesitant to move their core cryptographic infrastructure to th...

Read More

Blog Post: PQC Standards Released – Start Today

quantum-21-banner

Read More

CTO Sessions Webcast: Best Practices for Data in Transit Encryption

hse-webcast-2024-tn

High speed networks are the critical foundation that supports many of an agency’s most vital communications and operations. However, this foundation i...

Read More

CTO Sessions Webcast: How-to Guide for Enhancing HPE Infrastructure Security

hpe-on-demand-webcast-tn

Sensitive data stored in HPE deployments must be encrypted edge-to-cloud. For encryption to successfully secure sensitive data, the cryptographic keys...

Read More

CTO Sessions Webcast: Thales TCT + Imperva Trusted End-to-End Data Security

Copy of 24-imperva-dsf-webcast-social

Ongoing government-wide zero trust implementations exemplify the fact that traditional end-point and perimeter-based security are not enough to protec...

Read More

CTO Sessions: Quantum-Resistant Code Signing

LMS-webcast-on-demand

Stateful hash-based signature (HBS) schemes are digital signature schemes believed to be resistant to the threat posed by a cryptographically relevant...

Read More

CTO Sessions: Quantum Resistant Security

replay-24-quantum-webcast-social (1)

Quantum computing’s impact is likely to be large—the potential computational power could render today’s encryption algorithms obsolete. The White Hous...

Read More

Cipher Summit Resource Hub

cipher-summit-resource-hub-tn

The Cipher Summit Resource Hub contains all of the action from this year’s event!

Read More