
How to make sure your digital transformation is secure
With more companies embracing digital transformation, how can they maintain a high level of cybersecurity while incorporating new technologies? We discuss in this blog ... Read More

Can good cybersecurity policies improve our quality of life?
Robust cybersecurity posture has become an essential part of our digital world, not only for its ability to protect us, but also to help us achieve a better quality of life ... Read More

Maintaining Data Security Integrity and Trust Infrastructure with Remote IT
Companies of all sizes, from the largest public enterprise to the smallest private firm, are all susceptible to cyberattacks. Having... The post Maintaining Data Security Integrity and Trust Infrastructure with Remote IT appeared first on Data Security Blog | Thales eSecurity ... Read More
Securing Corporate Data When Remote Working is the Norm
While many companies have deployed extra measures to secure employees’ remote access to corporate resources and apps, it is important... The post Securing Corporate Data When Remote Working is the Norm appeared first on Data Security Blog | Thales eSecurity ... Read More
RSAC 2020: The roaring 20s. A new decade brings new cybersecurity opportunities and challenges
In a matter of a few days, security professionals from near and far will descend upon downtown San Francisco to... The post RSAC 2020: The roaring 20s. A new decade brings new cybersecurity opportunities and challenges appeared first on Data Security Blog | Thales eSecurity ... Read More
Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices
In the spirit of National Cyber Security Awareness Month (NCSAM), my colleague Ashvin Kamaraju wrote about how organizations can use... The post Protect IT—A Combination of Security Culture and Cyber Hygiene Good Practices appeared first on Data Security Blog | Thales eSecurity ... Read More
Achieving Trust: Bake Security into Your Brand
Data is the most valuable online currency a consumer possesses. Yet most people don’t trust the companies they’re sharing data... The post Achieving Trust: Bake Security into Your Brand appeared first on Data Security Blog | Thales eSecurity ... Read More
How to prepare for the California Consumer Privacy Act
On June 28, 2018 the governor of California Jerry Brown signed into law with Assembly Bill No. 375 the California... The post How to prepare for the California Consumer Privacy Act appeared first on Data Security Blog | Thales eSecurity ... Read More
The Race is On! Crypto Agility vs Quantum Computing. Who is ahead?
Preparing for Data Security in the Quantum Computing Era Each passing day brings the world closer to the exciting reality... The post The Race is On! Crypto Agility vs Quantum Computing. Who is ahead? appeared first on Data Security Blog | Thales eSecurity ... Read More

March Madness and Distracted Employees – Bracket Busted
It’s March and with that comes the inevitable 70 million brackets to be completed predicting 67 basketball games over a... The post March Madness and Distracted Employees – Bracket Busted appeared first on Data Security Blog | Thales eSecurity ... Read More