How to Keep Your Information Safe for Data Privacy Day 2020
January 28, 2020 marks the 13th iteration of Data Privacy Day. An extension of the celebration for Data Protection Day... The post How to Keep Your Information Safe for Data Privacy Day 2020 appeared first on Data Security Blog | Thales eSecurity ... Read More
Post-GDPR Developments on Data Protection and Privacy Regulations Around the World
In the modern era of a global information economy, every single day, enormous amounts of information are transmitted, stored and... The post Post-GDPR Developments on Data Protection and Privacy Regulations Around the World appeared first on Data Security Blog | Thales eSecurity ... Read More
Halloween: The curse of data
We’ve all watched a horror film and said “why are you doing that?!” as the main characters walk aimlessly down... The post Halloween: The curse of data appeared first on Data Security Blog | Thales eSecurity ... Read More

Own Your Cloud Security
It’s hard to believe it’s mid-October. Along with autumn, comes National Cybersecurity Awareness Month (NCSAM). The NCSAM 2019 focuses on... The post Own Your Cloud Security appeared first on Data Security Blog | Thales eSecurity ... Read More

The rise of hybrid cloud poses new security challenges – are you prepared?
There aren’t many sure bets in technology today, but it’s hard to see an enterprise world without the use of... The post The rise of hybrid cloud poses new security challenges – are you prepared? appeared first on Data Security Blog | Thales eSecurity ... Read More

Take Control of Your CloudHSM Migration Plan
When your cryptographic keys are already secured using the HSMs from the leading data protection provider in industry, and you don’t want to downgrade your security for your Cloud First plans: you have a choice. That choice is Thales – the SafeNet HSMs you know and trust. For hybrid and ... Read More

Choosing the Right Cloud HSM
Hardware Security Modules (HSM) are vital to the security of today’s cloud-enabled, digital world. They act as trust anchors that protect encryption and the cryptographic infrastructure of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys. Without them, data, transactions and the increasing number ... Read More