Skip to main content
  • Global
  • Markets
  • Career
  • Investor
  • Journalist
  • Customer Online
  • Supplier
  • Countries
  • English
  • عربى
  • 中文
  • Nederlandse
  • French
  • Deutsch
  • Italiano
  • 日本語
  • Español
  • Polski
  • Português, Brazil
  • Português, Portugal
  • Schweizerdeutsch
  • Turkish
  • 中文
  • Magyar
  • Swedish
  • Finnish
  • Romanian
  • Danish
  • Greek
  • Indonesian
  • Norwegian Bokmål
  • Korean
  • Czech
  • Bulgarian
  • Estonian
  • Latvian
  • Lithuanian
  • Slovak
  • Slovenian

Search form

You are here :

  • Home

All Articles in Review

09 Aug 2022

Have you got data security fatigue?

As the number of cyber attacks grows, worn-out security professionals are struggling to keep up
Read more
21 Jan 2020

What is biometric technology?

Our infographic looks behind biometric technology: what it is, how it works and why it’s becoming so popular
Read more
21 Jan 2020

Top 5 IoT predictions for 2020

2020 predictions for the IoT: from more smart speakers to better healthcare and a more efficient workplace, we look at how it could impact our lives in 2020
Read more
18 Dec 2019

Voice assistants and the new security challenge

Amazon has announced an initiative that means multiple voice services can work on the same device. So as voice recognition technology advances, how will we see it play out in the connected home?
Read more
16 Nov 2021

The Technology Behind the Payments Process (infographic)

Our infographic explains the multiple behind-the-scenes steps required for the authorization of in-store and online payments.
Read more
01 Jan 2021

Smart grid technology: benefits and security challenges

Smart meters and smart grids offer enormous benefits but also bring new cybersecurity risks that require dedicated cyber security solutions and smart regulations
Read more
25 Oct 2019

Blockchain: beyond fintech

Blockchain is often associated with the financial sector, but things are changing. We look at some of the different ways blockchain technology is being used
Read more
27 Sep 2022

Six ways to spot social engineering

Social engineering is an increasingly popular method of hacking. Here are 6 tips on how to spot this type of cyber attack
Read more
10 May 2021

Beyond GDPR: Data protection around the world

Overview of the right to protection of personal data, data protection regulations and directives.around the world ...
Read more
23 Sep 2019

Cyber security tops business agenda in new survey

Organizations are using a range of initiatives to improve their cyber security, but limited funding and resources remain an obstacle​
Read more
  • First page « First
  • Previous page ‹‹
  • …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Current page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • Next page ››
  • Last page Last »

.

  • Defence and Security
  • Digital Identity and Security
  • Aerospace
  • Space
  • Transverse markets
  • Specific solutions

Social networks

  • Linkedin
  • Twitter
  • Facebook
  • Youtube
  • Instagram

Contact us

Thales Headquarters

+33 (0) 1 57 77 80 00

Send a message
  • Global
  • Markets
  • Career
  • Investor
  • Journalist
  • Customer Online
  • Supplier
© 2025 Thales
  • Credits
  • Terms of Use
  • Personal Data
  • Sitemap
  • Accessibility: partially accessible