Thales Trusted Cyber Technologies   Contact Us | Careers

Top 5 Ways to Comply with the White House EO on Cybersecurity – Part 1 – Setting the Stage

Thales TCT Video (1)

The White House issued an Executive Order on improving the Nation’s Cybersecurity on May 12, 2021. The Executive Order gives agencies 180 days t...

Read More

Cyber EO Compliance Video Series – Part 3 – Data at Rest Encryption

Thales TCT Video (1)

Part 3 of this video series, based on a recent Thales TCT webinar, discusses Section 3.d of the Executive Order which requires the implementation of e...

Read More

Cyber EO Compliance Video Series – Part 4 – Data in Transit Encryption

Thales TCT Video (1)

Protecting network transmitted data against cyber-attacks and data breaches is imperative. High-assurance network encryption features secure, dedicate...

Read More

Cyber EO Compliance Video Series – Part 5 – Securing Cloud Deployments

Thales TCT Video (1)

Part 5 of this video series based on a recent Thales TCT webinar discusses how to secure cloud deployments. Government agencies should focus on implem...

Read More

Cyber EO Compliance Video Series – Part 6 – Implementing a Zero Trust Architecture

Thales TCT Video (1)

Part 6 of this video series based on a recent Thales TCT webinar discusses Zero Trust. Implementing a zero trust approach to data security is one of t...

Read More

On Demand Webinar: Rapid Protection for Teradata Database and Big Data Environments

web-tn-teradata

Teradata databases and big data analytics enable agencies to leverage information to fuel improved decisions, services, and results. However, Teradata...

Read More

On Demand Webinar: No-Excuse Defenses Against Supply Chain Attacks

web-tn-sypplychain

Files from the web are network assassins. Here are no-excuse defenses. As of 2018, supply chain attacks have increased 78%. By infiltrating a supply c...

Read More

On Demand Webinar: Best Practices for Data Visibility

web-tn-data-visibiity

To recap, during this webinar attendees learned how to develop a data classification strategy that enables you to get a clear understanding of what se...

Read More

On Demand Webinar: Best Practices for Cloud Data Protection

web-tn-cloud-dp

Cloud Service Providers (CSPs) emphasize the shared responsibility model for securing data in the cloud and meeting compliance requirements for inform...

Read More

On Demand Webinar: The Key Pillars for Protecting Sensitive Data

web-tn-intel-community (1)

During this webinar, attendees learned how to develop a three-point strategy for protecting sensitive data in their organization. Attendees also learn...

Read More