The next wave of mobile networks will connect billions of people and things over the coming years. It will open up a world of opportunity, for both users and operators, but also raises concerns about cybersecurity and data privacy.
Emmanuel Unguran, VP Mobile Connecti...
On Monday 24 May, the Thales team at Rydalmere were privileged to welcome Darug Elder Uncle Colin Locke to site; the visit coinciding with National Reconciliation Week which commences today, Thursday 27 May.
Force Multiplier is an on demand contract Intelligence, Surveillance and Reconnaissance (ISR) platform for both domestic and international special missions
Paris, May 27, 2021 – Atos and Thales announce the creation of Athea, a joint venture that will develop a sovereign big data and artificial intelligence platform for public and private sector players in the defence, intelligence and internal state security communities....
• The 5G SA-Compatible eSIM features on OPPO's latest flagship 5G smartphone, OPPO Find X3 Pro
• eSIM technology will bring new possibilities for smart devices in the 5G era
Thales and Airbus have pooled their expertise to supply the French armed forces with high-added-value maps on the Geomaps project. This long-standing relationship has enabled the partners to win recognition as leading experts in this particularly complex and demanding ...
There are more connected vehicles on the roads than ever before, providing a new, more dynamic and more comfortable driving experience for their users. Ensuring that these vehicles can run as they are supposed to requires permanent and robust connectivity, but that bri...
How Thales helped a leading financial conglomerate become one of the first Regulated Entities to initiate compliance with a new government security regulation — reinforcing the conglomerate’s…
Access management enables the right user access to the right resource at the right level of trust. IAM solutions address these challenges, and enable secure cloud adoption.
You've likely seen the headlines about ransomware attacks and the monumental challenges they pose for organizations. But what should you do when an attack occurs, even if you have a ransomware…