Aller au contenu principal
Résultats à partir du site CPL cpl.thalesgroup.com

Making Waves: Empowering Women in Cybersecurity

As International Women’s Day approaches, it’s a perfect moment to reflect on the pivotal role of diversity in technology, especially as this year’s theme is #InspireInclusion. In this fast-paced…

What the NFL can teach us about building a winning data security strategy

When it comes to data security, a unified approach is crucial. Cybersecurity should be viewed as a team effort, with defense, offense, and kicking teams all executing the focused game plan.In fact,…

API Security in 2024: Imperva Report Uncovers Rising Threats and the Urgent Need for Action

APIs (Application Programming Interfaces) are the backbone of modern digital innovation. They drive seamless connectivity, enable rapid development, and power countless business-critical applications…

Ransomware Attacks: The Constant and Evolving Cybersecurity Threat

Enterprise data collection is skyrocketing, driven by factors like connected devices, cloud computing, personal data collection and digital transactions. It accounts for 25% of all data breaches.…

Keeping Customer Data Safe: AI's Privacy Paradox

AI's appeal lies in its ability to personalize and streamline customer experiences in ways previously unimaginable. Through sophisticated algorithms and machine learning capabilities, AI can analyze…

QR Code Scams: What You Need to Know About This Phishing Tactic

In a world where individuals and organizations alike are increasingly dependent on digital processes, cybercriminals are constantly looking for and developing new ways to exploit technology to take…

Data Security Trends: 2024 Report Analysis

Amid ongoing economic uncertainty and a progressively complex threat landscape, businesses are trying to navigate increasingly stringent regulatory requirements while bolstering their security…

How to Meet Phishing-Resistant MFA Requirements

Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It's a sensible decision to utilize MFA. The bigger…

Key Management as a Service (KMaaS) Explained

As companies adopt a cloud-first strategy and high-profile breaches hit the headlines, securing sensitive data has become a paramount business concern. The most effective way to ensure data security…

Luna HSMs FIPS 140-3 Validation

FIPS 140-3 and You, Part TwoAwhile back, we shared that Thales Luna HSMs were about to kick-off the process of moving towards Federal Information Processing Standard (FIPS) 140-3 Level 3, the newest…