Syndicated Blog

Thales CPL Blog Feed
Confidential Computing

Secure your data throughout its lifecycle with End-to-End Data Protection

|
Secure your data throughout its lifecycle with End-to-End Data Protection madhav Thu, 06/19/2025 - 07:53 To most of us, perhaps unknowingly, data is everything. Whether it is a groundbreaking idea, sensitive health ...
Securing the Future Together: Why Thales and HPE are the Partners You Can Trust

Securing the Future Together: Why Thales and HPE are the Partners You Can Trust

|
Securing the Future Together: Why Thales and HPE are the Partners You Can Trust madhav Tue, 06/17/2025 - 05:15 Across every industry, data drives decisions, innovation, and growth. As organizations modernize with ...
How Thales and AWS Address Advanced Sovereignty Requirements in the Cloud

How Thales and AWS Address Advanced Sovereignty Requirements in the Cloud

|
How Thales and AWS Address Advanced Sovereignty Requirements in the Cloud madhav Thu, 06/12/2025 - 05:25 As regulatory requirements for digital sovereignty continue to evolve, European organizations—particularly in highly regulated sectors—are seeking ...
Why Data Sovereignty and Privacy Matter to You—Not Just Nations

Why Data Sovereignty and Privacy Matter to You—Not Just Nations

|
Why Data Sovereignty and Privacy Matter to You—Not Just Nations madhav Tue, 06/10/2025 - 07:17 It started with a well-meaning mistake.Bernie, a project manager at a mid-Atlantic regional health provider, was coordinating ...
Preparing for PQC Compliance & Regulations

FIPS 140-3 and You, Part Three

|
FIPS 140-3 and You, Part Three divya Thu, 06/05/2025 - 07:00 Last spring, in the second installment of this blog series, we were excited to announce that our Luna HSM product line ...
Conquering complexity and risk with data security posture insights

Conquering complexity and risk with data security posture insights

|
Conquering complexity and risk with data security posture insights madhav Tue, 06/03/2025 - 07:35 In today’s competitive landscape it has become an increasingly important for businesses looking for ways to adapt their ...
How New U.S. Legislation Changes Global Digital Sovereignty as We Know It

How New U.S. Legislation Changes Global Digital Sovereignty as We Know It

|
How New U.S. Legislation Changes Global Digital Sovereignty as We Know It madhav Thu, 05/29/2025 - 07:02 Discover how U.S. data laws like FISA 702 and CLOUD Act impact global IAM strategies ...
AI, Quantum and the Evolving Threat Landscape:  Key Findings from the Thales 2025 Data Threat Report

AI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report

|
AI, Quantum and the Evolving Threat Landscape: Key Findings from the Thales 2025 Data Threat Report madhav Tue, 05/27/2025 - 07:40 The Thales 2025 Data Threat Report reveals a critical inflection point ...
Identiverse 2025 - Where Physical and Digital Identities Converge

Identiverse 2025 – Where Physical and Digital Identities Converge

|
Identiverse 2025 - Where Physical and Digital Identities Converge madhav Thu, 05/22/2025 - 07:18 On June 3-6, over 3,000 experts will converge in Las Vegas to explore cutting-edge innovations in identity security ...
Your Data, Your Responsibility: Securing Your Organization's Future in the Cloud

Your Data, Your Responsibility: Securing Your Organization’s Future in the Cloud

|
Your Data, Your Responsibility: Securing Your Organization's Future in the Cloud madhav Tue, 05/20/2025 - 07:37 Cloud adoption has fundamentally changed the way businesses operate, offering scalability, agility, and cost efficiencies that ...