Remove author thales
article thumbnail

How Thales and Red Hat Protect Telcos from API Attacks

Thales Cloud Protection & Licensing

How Thales and Red Hat Protect Telcos from API Attacks madhav Thu, 02/22/2024 - 04:55 Application programming interfaces (APIs) power nearly every aspect of modern applications and have become the backbone of today’s economy. Unfortunately, API attacks are increasing as vectors for security incidents. What are APIs?

article thumbnail

Post-Quantum Cryptography (PQC): Three Easy Ways to Prepare

Thales Cloud Protection & Licensing

Thales and Keyfactor together have delivered proven key management and PKI solutions to ensure digital trust. During Keyfactor’s recent Tech Days event (which Thales co-sponsored) Mark Thompson, SVP of Product Management, spoke about how Keyfactor’s product portfolio will transform the post-quantum world.

IoT 127
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Clock To Q-Day Is Ticking: InfoSec Global and Thales Provide Collaborative Path to Quantum Readiness

Thales Cloud Protection & Licensing

This looming threat prompted InfoSec Global to collaborate with Thales to provide the market with the ability to kick-start their journey toward quantum safety by collecting granular relevant information on their current cryptographic posture. We also revisit the PQC standardization process and its implications for businesses worldwide.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

Guest Blog: TalkingTrust. You also need to ensure that devices can verify the signature to ensure that only authorized code can run on them, not malicious malware spoofed with another signature. due to weak encryption) allows hackers to gain authorized access to a vehicle. Thales + Keyfactor: IoT Security by Design.

IoT 77
article thumbnail

Three Easy Ways to Improve DevSecOps with Thales and Red Hat

Thales Cloud Protection & Licensing

Three Easy Ways to Improve DevSecOps with Thales and Red Hat divya Tue, 10/17/2023 - 14:47 For many DevOps enthusiasts, the need to insert security considerations directly into the development cycle was often overlooked. To address these challenges, Thales and Red Hat offer data protection and automation solutions.

article thumbnail

How better key management can close cloud security gaps troubling US government (Part 1 of 2)

Thales Cloud Protection & Licensing

How better key management can close cloud security gaps troubling US government (Part 1 of 2) sparsh Tue, 11/28/2023 - 05:20 Bruce Schneier recently blogged : A bunch of networks, including US Government networks , have been hacked by the Chinese. Cloud Security Krishna Ksheerabdhi | VP, Product Marketing More About This Author > Schema

Cloud 83
article thumbnail

Stop Ransomware in its Tracks With CipherTrust Transparent Encryption Ransomware Protection

Thales Cloud Protection & Licensing

Stop Ransomware in its Tracks With CipherTrust Transparent Encryption Ransomware Protection madhav Wed, 04/17/2024 - 05:22 Our last blog Ransomware Attacks: The Constant and Evolving Cybersecurity Threat described the ever dangerous and evolving cybersecurity threat of ransomware. This can model ransomware behavior for brief moments.