August 28, 2024 Thales Trusted Cyber Technologies (TCT) is pleased to announce the release of the Luna T-Series Tablet Hardware Security Module (HSM). The small form factor and offline key storage capability set the product apart, maki...
Continue →August 13, 2024 Thales Trusted Cyber Technologies (TCT) would like to congratulate NIST, academia, and industry in reaching the milestone of releasing the first set of Post Quantum Cryptography (PQC) standards. This milestone is a result of ...
Continue →July 22, 2024 | FedGovToday Gina Scinta, Deputy CTO at Thales TCT, discussed the dual aspects of AI in cybersecurity: using AI for cybersecurity tasks and securing AI data. Scinta highlighted the importance of identity access management and ...
Continue →July 8, 2024 | Intelligence Community News By Bill Becker, CTO, Thales Trusted Cyber Technologies The rapid acceptance of artificial intelligence (AI) across a range of applications in both the public and private sectors carries with it ...
Continue →June 3, 2024 Thales completed its acquisition of Imperva earlier this year. We are pleased to share that Imperva solutions are now available for sale to the U.S. Federal Government through Thales Trusted Cyber Technologies. With the...
Continue →May 6, 2024 | Intelligence Community News Web applications are the entry point to an organization’s data, which makes them a prime target for hackers. From attacks that have shut down corporate and government sites, to Distributed Denial of ...
Continue →March 4, 2024 | Intelligence Community News When it comes to deploying multifactor authentication (MFA) solutions for cybersecurity, an added wrinkle is that these solutions now must be phishing-resistant, to hold off the relentless onslaugh...
Continue →January 2024 | This interview originally appeared on Innovation in Government from DoDIIS In an engaging interview with Francis Rose, Gina Scinta, Deputy CTO of Thales Trusted Cyber Technologies, explores the implications of ...
Continue →December 13, 2023 | Washington Technology Validating the integrity of IT products’ supply chain has been a critical part of cybersecurity for years. Historically, hardware bill of materials were scrutinized by federal agencies to ensure tha...
Continue →December 7, 2023 Thales Trusted Cyber Technologies (TCT) is pleased to name Blackwood Associates, Inc. as its 2023 Partner of the Year. Thales TCT bestows its partner of the year award to its channel partner who significantly contributes tow...
Continue →October 23, 2023 | Washington Technology While a standard isn't in place yet, now is the time to understand your risks and put a focus on agility. Okay, we get it: Quantum computers will break today’s public key cryptography. So, now what...
Continue →September 15, 2023 | Federal News Network | Cyber Leader's Exchange 2023 It might be only a half year since the government issues its National Cyber Strategy, but agencies and industry already are adjusting their expectations on managin...
Continue →May 9, 2023 | Intelligence Community News In early March, the Biden-Harris Administration released its new National Cybersecurity Strategy. The strategy builds upon momentum established by the administration’s previously released cybers...
Continue →March 23, 2023 Thales Trusted Cyber Technologies (TCT), a trusted U.S. based source for cyber security solutions, and XTec, a leader in identity, credential and access management (ICAM) technology, today announced that Thales TCT’s flagship ...
Continue →March 8, 2023 | Intelligence Community News In the past, it may have been enough to think about data protection at the core or strategic level. Today, however, defense, intelligence and civilian agencies must extend their data protection str...
Continue →March 2, 2023 Thales Trusted Cyber Technologies (TCT), a trusted U.S. based source for cyber security solutions, today announced that it is collaborating with the National Institute of Standards and Technology (NIST) National Cybersecurity C...
Continue →December 5, 2022 Thales Trusted Cyber Technologies (TCT) is pleased to name World Wide Technology (WWT) as its 2022 Partner of the Year. Thales TCT bestows its partner of the year award to its channel partner who significantly contributes to...
Continue →November 10, 2022 Thales Trusted Cyber Technologies (TCT) and the National Security Agency (NSA) signed a Cooperative Research and Development Agreement (CRADA) for evaluating the National Institute of Standards and Technology (NIST) selecte...
Continue →Designed for Small to Medium Sized Deployments, CipherTrust k160 extends the best-in-class security features of the CipherTrust Data Security Platform to Environments at the Edge September 6, 2022 Thales Trusted Cyber Technologies (TCT), ...
Continue →Thales Trusted Cyber Technologies (TCT), a trusted U.S. based source for cyber security solutions, today announced that it is collaborating with the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellen...
Continue →Government Computer News Agencies must understand what data is at risk and mitigate that risk with crypto-agile solutions as post quantum crypto standards are finalized. Read Article
Continue →Thales Trusted Cyber Technologies, a trusted U.S. based source for cyber security solutions, today announced that it has received United States Department of Defense Information Network Approved Products List (DoDIN APL) Approval for&...
Continue →Intelligence Community News We want to think that we’ve made our IT systems relatively impervious to ransomware attacks, but trends are showing otherwise. Rather than focusing on only preventing breaches, we have to consider the importance ...
Continue →Intelligence Community News In this article, we’ll look at the background of quantum computing in government, technologies to mitigate quantum attacks, and the top ten considerations for a truly crypto-agile solution. Together, this should ...
Continue →April 18, 2022 Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced that its Smart Card 650 v4.2 token (SC650) has received approval from the National Security Agency (NSA) for u...
Continue →Intelligence Community News When moving to the cloud, the number one topic of conversation is almost always focused around security. Despite this, cloud security is often an afterthought when migrating workloads to the cloud Read Articl...
Continue →Intelligence Community News At the surface, the requirements of the May 2021 EO 14028 and the NSM may have seemed like a ground-breaking call to action. The reality is that many agencies have already been hard at work creating systems to pr...
Continue →Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced the appointment of Gina Scinta as the company’s Deputy Chief Technology Officer (CTO). As Deputy CTO, Ms. Scinta will serve as T...
Continue →Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced the appointment of Bill Becker as the company’s Chief Technology Officer (CTO). As CTO, Mr. Becker will focus on driving the com...
Continue →Government Computer News According to a study from Cybersecurity Ventures, ransomware attacks happen every 11 seconds. Read Article
Continue →Washington Technology With some deadlines already having arrived and others looming, the May 2021 “Executive Order on Improving the Nation’s Cybersecurity” has IT professionals taking a hard look at security measures ranging from Zero Trust ...
Continue →Government Computer News It’s no surprise that the past year has seen increased attention in network security. The pandemic-driven growth in telework has brought with it growing security threats, and the continuing rise of ransomware attack...
Continue →Government Computer News Despite recent unverified claims that DarkSide, the ransomware hacking operation responsible for the Colonial Pipeline attack, has dismantled its operations, the incident reinforces one important point for governmen...
Continue →Government Computer News If the ongoing reporting and scorecards for the Federal Information Technology Acquisition Reform Act have proved anything over the past several years, it’s that many agencies have had trouble quantifying sensitive ...
Continue →Carahsoft Community A supply chain attack aims to damage an organization by targeting less secure elements in its supply network. The initial victim becomes a steppingstone to infiltrate other networks. Exploiting a service provider’s data ...
Continue →VALIDATION SIGNIFIES THAT THE LUNA T-SERIES HARDWARE SECURITY MODULES MEET NIST’S HIGHEST LEVEL OF SECURITY STANDARDS Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced that i...
Continue →Intelligence Community News Let’s take a look Zero Trust, and how a strategy based on its principles can help achieve security in a post-perimeter environment. In particular, we’ll address the NIST Special Publication on Zero Trust, and con...
Continue →Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced the appointment of Lloyd Mitchell as the company’s new President. Mr. Mitchell will focus on expanding the company’s portfolio o...
Continue →Intelligence Community News IT security has traditionally focused on perimeter defense – essentially building walls around the infrastructure to prevent network incursions. Unfortunately, that is just not enough for real security. If today’...
Continue →Government Computer News What should an agency’s “information security program” include? With agencies’ increased emphasis on big data throughout their operations, if the program does not include a strategy for big data and cloud security, ...
Continue →Government Computer News The recent SolarWinds supply chain hack will go down as one of the most serious of 2020, but it’s likely to be just the beginning of more concerted efforts by bad actors to interfere with security in both the govern...
Continue →Thales Trusted Cyber Technologies (TCT) is pleased to name GuidePoint Security as its 2020 Partner of the Year. Thales TCT bestows its partner of the year award to its channel partner who significantly contributes towards the company’s mission ...
Continue →Government Computer News Government has a pressing need for a secure place to share and store content, with complete control over where data is located. This need has only been exacerbated by the growth of work from home prompted by the COV...
Continue →Government Computer News How does an organization provide security credentials for a robot? Those that haven’t started thinking about it yet soon will, as increased interest in robotic process automation (RPA) pushes government agencies to ...
Continue →Government Computer News As if cybersecurity defense was not already a full-time job, now agency employees have to stay vigilant against a new phishing attempt so sophisticated it is escaping even many email detection services and might eve...
Continue →Business Wire Votiro, a global leader in positive selection™ technology, announced a partnership and distribution agreement with Thales. Thales will offer proven solutions from Votiro’s Secure File Gateway product line—including Email and We...
Continue →Government Computer News Digital transformation (DX) can be both a blessing and a curse for government agencies. New technologies simultaneously improve the user experience and expose those same users -- and the agencies themselves -- to da...
Continue →Government Computer News You know who hasn’t been bored by coronavirus isolation? Hackers. As more government employees work from home, often from their personal computers, it’s not uncommon for some basic levels of cyber hygiene to have sl...
Continue →NextGov U.S. federal agencies are leading global counterparts and private sector entities in digital transformation, but their use of cloud services and connected devices brings risks they’re not appropriately adjusting to, according to an a...
Continue →Government Computer News If we are to heed the call for online elections, to move voting applications to mobile devices, we must acknowledge there’s no definite way to secure those applications. Even sole-sourced app development can be comp...
Continue →Government Computer News In the midst of a very competitive set of primaries leading up to the presidential election, IT professionals in all levels of government must ensure voter information is not compromised. Unfortunately, it seems ele...
Continue →Government Computer News Agencies must create a security awareness strategy around IoT, especially to protect data at the network edge. Read Article
Continue →As of January 1, 2020, SafeNet Assured Technologies, LLC. and Thales Cloud Protection & Licensing, Federal will unite under a new name as Thales Trusted Cyber Technologies (TCT), a division of Thales Defense and Security Inc. (TDSI). TDSI i...
Continue →