Around the World with Thales: Our Upcoming Events madhav Thu, 09/28/2023 – 05:01 <div><p>The summer is long gone, and we are all back to work. However, there will be plenty of opportunity for us all to catch up as the…
Tag: Thales CPL Blog Feed
Happy Compliance Officer Day!
Happy Compliance Officer Day! madhav Tue, 09/26/2023 – 05:57 <div><p>The summer vacation seems a distant memory and my wife and I are firmly back in the routine of our kids being at school – with the added benefiting of the…
SaaS data security: here’s why enterprises need to focus on this fast-growing challenge now!
SaaS data security: here’s why enterprises need to focus on this fast-growing challenge now! madhav Thu, 09/21/2023 – 05:05 <div><h3>A perfect storm…</h3> For several years now and especially post-pandemic, enterprises have shifted to a distributed business model, where employees, devices,…
The Clock is Ticking for PCI DSS 4.0 Compliance
The Clock is Ticking for PCI DSS 4.0 Compliance madhav Tue, 09/19/2023 – 05:17 It is essential for any business that stores, processes, and transmits payment card information to comply with the Payment Card Industry Data Security Standard (PCI DSS).…
Thales & Prime Factors’ 30 Year Collaboration Continues to Deliver Simplicity, Flexibility, and Security for Payment Applications
Thales & Prime Factors’ 30 Year Collaboration Continues to Deliver Simplicity, Flexibility, and Security for Payment Applications madhav Thu, 09/14/2023 – 10:25 Thales recently announced the launch of the payShield Cloud HSM service, making it easier and more flexible for…
Thales 2023 Data Threat Report: The Increased Telco Cybersecurity Challenges in the 5G Era
Thales 2023 Data Threat Report: The Increased Telco Cybersecurity Challenges in the 5G Era madhav Tue, 09/12/2023 – 05:15 Telecommunications firms have always faced a unique set of security challenges. The rapid shift to higher levels of digitization has meant…
Grow Revenue, Cross Sell, and Reduce Churn with Sentinel Pulse
Grow Revenue, Cross Sell, and Reduce Churn with Sentinel Pulse madhav Fri, 09/08/2023 – 05:06 If you are a Sentinel entitlements management user, you can find opportunities in the current customer list to grow your revenue, cross-sell, and reduce churn…
3 Key Takeaways from the recently announced NIST Post-Quantum Cryptography Standards
3 Key Takeaways from the recently announced NIST Post-Quantum Cryptography Standards madhav Thu, 09/07/2023 – 05:16 The world relies on many protective measures today, even if it isn’t something you notice. Everything people interact with regularly, from cell phones and…
Thales OneWelcome Identity Platform Recognized as Overall and Market Leader by KuppingerCole
Thales OneWelcome Identity Platform Recognized as Overall and Market Leader by KuppingerCole madhav Tue, 09/05/2023 – 04:48 Thales OneWelcome Identity Platform is included in the KuppingerCole Access Management Leadership Compass 2023 analysis and is recognized as an Overall Leader and…
The bright side of data privacy compliance: 5 value-driven opportunities for retailers
The bright side of data privacy compliance: 5 value-driven opportunities for retailers madhav Thu, 08/31/2023 – 05:20 Failing to keep up with data privacy legislations, such as General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA) can…
How Thales and Red Hat Secure Kubernetes Data in a 5G World
How Thales and Red Hat Secure Kubernetes Data in a 5G World madhav Wed, 08/30/2023 – 07:29 Service providers that operate 5G networks face many challenges related to their highly distributed infrastructure. While Kubernetes presents a promising solution for addressing…
The UK and the US Build a ‘Data Bridge’ to Facilitate Personal Data Movements
The UK and the US Build a ‘Data Bridge’ to Facilitate Personal Data Movements andrew.gertz@t… Tue, 08/29/2023 – 13:41 Modern-day business transactions heavily rely on international data transfers. In 2021, 93% of the UK’s services exports were data-enabled, resulting in…
Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales
Accelerating Data Security and Manufacturing Production for Medical Sensors by 20x with nTropy.io and Thales madhav Tue, 08/22/2023 – 05:33 nTropy.io is a Thales Technology Partner with established PKI and IoT expertise providing both advisory and implementation services. This article…
Enterprise Secrets Management Explained: Best Practices, Challenges, and Tool Selection
Enterprise Secrets Management Explained: Best Practices, Challenges, and Tool Selection madhav Thu, 08/17/2023 – 06:28 Whether hosted in the cloud or on-premises, modern applications and integrations have accelerated the need for digital secrets. These secrets control data access when transferred…
Thales Luna HSMs Secure Digital Transactions of a Prominent Bangladeshi Bank
Thales Luna HSMs Secure Digital Transactions of a Prominent Bangladeshi Bank madhav Tue, 08/15/2023 – 04:57 Over the past ten years, banking and financial institutions worldwide have undergone a significant digital revolution. Innovative technologies have transformed payment transactions, banking processes,…
Maintaining the Optimal Blend for Digital Success
Maintaining the Optimal Blend for Digital Success madhav Tue, 08/15/2023 – 04:57 Operating in an increasingly challenging digital landscape, organizations must maintain a delicate balance between user experience, security, and privacy in every interaction. Customer Identity & Access Management (CIAM)…
Celebrating Infinity Day. To August 8th… and Beyond!
Celebrating Infinity Day. To August 8th… and Beyond! andrew.gertz@t… Tue, 08/08/2023 – 12:49 Infinity Day is a celebration that transcends boundaries, embracing the limitless potential of technology and its impact on our lives. This annual observance, held on August 8th…
Cloud Key Management Solution for Azure, Azure Stack and M365
Cloud Key Management Solution for Azure, Azure Stack and M365 madhav Thu, 08/03/2023 – 05:59 Uncover Your Cybersecurity Blind Spots Cybersecurity is a strategic risk that should be managed at the highest levels of an organization. In fact, the World…
Uncover Your Cybersecurity Blind Spots
Uncover Your Cybersecurity Blind Spots madhav Thu, 08/03/2023 – 05:59 Cybersecurity is a strategic risk that should be managed at the highest levels of an organization. In fact, the World Economic Forum’s Global Risk Report 2023 again ranked wide-spread cybercrime…
How to Meet Phishing-Resistant MFA Requirements
How to Meet Phishing-Resistant MFA Requirements madhav Tue, 08/01/2023 – 05:18 Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It’s a sensible decision to utilize MFA. The bigger question is, what…
How to Meet Phishing-Resistant MFA
How to Meet Phishing-Resistant MFA madhav Tue, 08/01/2023 – 05:18 Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It’s a sensible decision to utilize MFA. The bigger question is, what type…
Thales partners with Hint AG to provide managed security services for the Swiss healthcare sector
Thales partners with Hint AG to provide managed security services for the Swiss healthcare sector madhav Thu, 07/27/2023 – 04:32 Analysts from Statista are projecting that the Healthcare market in Switzerland will need to invest 1.3 billion Swiss Franks in…
Network Encryption Keeps Our Data in Motion Secure for Business Services
Network Encryption Keeps Our Data in Motion Secure for Business Services madhav Tue, 07/25/2023 – 04:59 The demand for high-speed networks and fast data transfers is increasing due to cloud adoption, digital transformation, and hybrid work. As global data is…
3 Ways to Protect Smart Devices from Criminal Exploits
3 Ways to Protect Smart Devices from Criminal Exploits madhav Thu, 07/20/2023 – 07:28 When people think of home or business security, they are usually worried about protecting against a physical breaking in via a window or door and a…
The Eternal Sunshine of the Criminal Mind
The Eternal Sunshine of the Criminal Mind madhav Tue, 07/18/2023 – 04:29 Everyone who works in cybersecurity or IT knows the frustration of dealing with relentlessly creative threat actors. Every day it seems, breaking industry news reveals another story about…
World Youth Skills Day 2023: Engaging Youth with Cybersecurity
World Youth Skills Day 2023: Engaging Youth with Cybersecurity madhav Thu, 07/13/2023 – 04:56 In 2014, the United Nations General Assembly declared 15 July as World Youth Skills Day to celebrate the strategic importance of equipping young people with skills…
Managing Complexity, Data Control, and Sovereignty in the Cloud
Managing Complexity, Data Control, and Sovereignty in the Cloud madhav Tue, 07/11/2023 – 05:08 55% of Organizations Feel Managing and Securing Cloud Data is Becoming More Complex Cloud computing has played a transformative role in some of the most significant…
Thales payShield receives the French Cartes Bancaires HSM certification
Thales payShield receives the French Cartes Bancaires HSM certification madhav Wed, 07/05/2023 – 04:35 Securing online payments is more important than ever. The meteoric rise of e-commerce and digital transactions has made online payments an essential part of doing business…
What is progressive profiling and how can it benefit your business?
What is progressive profiling and how can it benefit your business? madhav Tue, 07/04/2023 – 05:10 As the data trust gap between customers and businesses continue to grow, and as third-party cookies become redundant, there is an urgency to adopt…
CipherTrust Data Security Platform as-a-Service Helps Control and Secure Your Critical Data
CipherTrust Data Security Platform as-a-Service Helps Control and Secure Your Critical Data madhav Thu, 06/29/2023 – 05:59 Many organizations are searching for ways to simplify their data security operations and reduce the impact of external threats. However, as they adopt…
Small and Medium Businesses Day: Tips on Securing the Backbone of National Economies
Small and Medium Businesses Day: Tips on Securing the Backbone of National Economies madhav Tue, 06/27/2023 – 05:46 The United Nations General Assembly designated 27 June as Micro-, Small, and Medium-sized Enterprises Day to raise awareness of these businesses’ contribution…
How Thales and Red Hat Secure Kubernetes Data in a 5G World
How Thales and Red Hat Secure Kubernetes Data in a 5G World madhav Mon, 06/26/2023 – 05:03 The Mobile Network Operators (MNOs) that operate 5G mobile broadband networks face many challenges related to their highly distributed infrastructure. While Kubernetes presents…
Why Successful Central Bank Digital Currencies require Partnership engagement
Why Successful Central Bank Digital Currencies require Partnership engagement madhav Thu, 06/22/2023 – 06:23 In Part 1 of this blog series we explored what CBDC, or Central Bank Digital Currencies are, and why they are important. Successful completion of CBDC…
Why Sucessful Central Bank Digital Currencies require Partnership enagement
Why Sucessful Central Bank Digital Currencies require Partnership enagement madhav Thu, 06/22/2023 – 06:23 In Part 1 of this blog series we explored what CBDC, or Central Bank Digital Currencies are, and why they are important. Successful completion of CBDC…
New CA/B Forum Code Signing Requirements in Effect – Is Your Organization Compliant?
New CA/B Forum Code Signing Requirements in Effect – Is Your Organization Compliant? madhav Tue, 06/20/2023 – 06:29 Numerous breaches and malicious malware attacks have used fraudulent code signing certificates to cause significant damage of the certificate owner’s reputation and…
A Guide to Key Management as a Service
A Guide to Key Management as a Service madhav Wed, 06/14/2023 – 11:29 As companies adopt a cloud-first strategy and high-profile breaches hit the headlines, securing sensitive data has become a paramount business concern. The most effective way to ensure…
Thales Partners with Google Cloud to Build New, Generative-AI Powered Security Features
Thales Partners with Google Cloud to Build New, Generative-AI Powered Security Features madhav Mon, 06/12/2023 – 05:05 The past year has seen a stratospheric improvement in artificial intelligence (AI) technology. The launch of the first AI chatbot tool in December…
Fine-grained Authorization: Protecting and controlling user access in a digital-first world
Fine-grained Authorization: Protecting and controlling user access in a digital-first world madhav Fri, 06/09/2023 – 05:22 Strong and flexible customer authentication is a key driver for adopting a customer identity & access management (CIAM) solution, with customer experience and security…
Modern Identity and Access Security – Keeping the Good Guys In and the Bad Guys Out
Modern Identity and Access Security – Keeping the Good Guys In and the Bad Guys Out madhav Tue, 06/06/2023 – 07:27 Regarding identity and access, it’s becoming harder and harder, if not impossible, to distinguish the “good guys” from the…
Understanding SEBI’s Framework for Cloud Services Adoption by Financial Entities in India
Understanding SEBI’s Framework for Cloud Services Adoption by Financial Entities in India madhav Thu, 06/01/2023 – 06:17 Authorities and governments across the globe take measures and issue regulatory frameworks to protect the financial sector against the increasing threat landscape and…
What Are the Key Trends in Cybersecurity Right Now?
What Are the Key Trends in Cybersecurity Right Now? madhav Mon, 05/29/2023 – 07:07 Working in a sector as dynamic as cybersecurity, it’s all too rare that we can pause for a moment and reflect on what’s important. Fortunately, I…
CIAM in insurance: A unified, secure user experience with a single login
CIAM in insurance: A unified, secure user experience with a single login madhav Fri, 05/26/2023 – 07:33 In recent years, the insurance industry has transformed from a singularly focused entity to a multi-brand or multi-service type of business. Most insurance…
The Rise of the Sovereign Cloud
The Rise of the Sovereign Cloud sparsh Thu, 05/25/2023 – 04:04 One of the big ironies about data on the internet is that once the goal of achieving a centreless web of data communication (the internet itself) had been developed…
8 Key Components of a CIAM Platform
8 Key Components of a CIAM Platform sparsh Tue, 05/23/2023 – 04:15 Customer Identity and Access Management (CIAM) is essentially developed to improve the customer experience (CX), ensure the highest level of security, protect customer data, and support the management…
Ransomware – Stop’em Before They Wreak Havoc
Ransomware – Stop’em Before They Wreak Havoc madhav Thu, 05/18/2023 – 06:03 Cybercriminals have been making a run on your data with ransomware attacks over the last decade in increasing frequency. They wreak havoc by bringing critical infrastructures, supply chains,…
How to Maximize Cloud Benefit with Digital Sovereignty
How to Maximize Cloud Benefit with Digital Sovereignty divya Tue, 05/16/2023 – 06:34 Driven by changing worldwide privacy legislation and regulation, digital sovereignty has become a major concern for organizations worldwide. According to the S&P Global Market Intelligence 2023 Data…
The Retail Data Threat Environment and Why CIAM is a Key Cornerstone to Better Cybersecurity.
The Retail Data Threat Environment and Why CIAM is a Key Cornerstone to Better Cybersecurity. madhav Thu, 05/11/2023 – 06:06 The retail landscape has changed significantly. Digital payments have increased at an unprecedented rate, the global pandemic changed our shopping…
Thales 2023 Data Threat Report: Sovereignty, Transformation, and Global Challenges
Thales 2023 Data Threat Report: Sovereignty, Transformation, and Global Challenges madhav Tue, 05/09/2023 – 05:30 Despite the economic and geopolitical instability in 2022, enterprises continued to invest in their operations and digital transformation. Organizations balanced security and privacy risks with…
Meet Thales at the KuppingerCole European Identity and Cloud Conference 2023
Meet Thales at the KuppingerCole European Identity and Cloud Conference 2023 madhav Wed, 05/03/2023 – 08:08 From May 9 to May 12, 2023, Berlin will host the European Identity and Cloud Conference (EIC), organized by industry analyst KuppingerCole. The EIC…
5 Ways CIAM Enables Effective, Secure Business Partner Identity Management
5 Ways CIAM Enables Effective, Secure Business Partner Identity Management madhav Tue, 05/02/2023 – 05:40 Businesses and their partners must work together without barriers to maximize customer value. The difficulty lies in determining how to make the most of their…
What Are the Latest Developments from Thales in Data Security and IAM at RSA Conference 2023?
What Are the Latest Developments from Thales in Data Security and IAM at RSA Conference 2023? madhav Thu, 04/27/2023 – 05:55 We’ve been having a great week participating in RSA Conference 2023 and this year’s theme, Stronger Together, couldn’t be…
World IP Day 2023: Defending Against the On-Going Threat to Intellectual Property
World IP Day 2023: Defending Against the On-Going Threat to Intellectual Property madhav Wed, 04/26/2023 – 05:48 World Intellectual Property Day, celebrated each year on April 26th, is a day to recognize and raise awareness of intellectual property (IP) rights…
Thales CipherTrust Manager Integrates with archTIS NC Encrypt to Secure Business Critical Content in Microsoft 365 Applications
Thales CipherTrust Manager Integrates with archTIS NC Encrypt to Secure Business Critical Content in Microsoft 365 Applications madhav Tue, 04/25/2023 – 05:52 Thales is a founding member of the Microsoft Intelligent Security Association (MISA). MISA members are top experts from…
Protecting Gig Identities – The 7 CIAM Capabilities You Need
Protecting Gig Identities – The 7 CIAM Capabilities You Need sparsh Thu, 04/20/2023 – 05:54 There is no doubt, the gig economy is growing. In today’s highly connected world, many companies prefer hiring short-term workers and contractors instead of full-time…
RSA Conference 2023: Meet Thales Where the World Talks Security!
RSA Conference 2023: Meet Thales Where the World Talks Security! madhav Tue, 04/18/2023 – 07:06 “Alone we can do so little; together we can do so much.” – Helen Keller At Thales, we couldn’t be more excited about RSA Conference…
Post-Quantum Cryptography (PQC): Three Easy Ways to Prepare
Post-Quantum Cryptography (PQC): Three Easy Ways to Prepare madhav Fri, 04/14/2023 – 06:05 The infamous Y2K “disaster” was successfully averted because people paid heed and prepared well in advance. Likewise, many Post-Quantum Computing (PCQ) security concerns can be addressed ahead…
This Identity Management Day, Go BIG or Go HOME!
This Identity Management Day, Go BIG or Go HOME! madhav Wed, 04/12/2023 – 06:11 Identity and Access Management (IAM) has evolved significantly over the past decade. It almost feels like we’re at an inflection point at the moment. There are…
The Security Challenges of Generative AI Tools: Can a Loose Prompt Sink Your Ship?
The Security Challenges of Generative AI Tools: Can a Loose Prompt Sink Your Ship? madhav Tue, 04/04/2023 – 07:04 During WWII, the US Office of War Information created posters encouraging people to avoid careless talk. The message was, “Loose lips…
World Backup Day 2023: Five Essential Cyber Hygiene Tips
World Backup Day 2023: Five Essential Cyber Hygiene Tips madhav Thu, 03/30/2023 – 05:54 World Backup Day, celebrated each year on March 31st, is a day created to promote backing up data from your devices. First observed in 2011, the…
EU Security and Privacy Laws: What to Expect in 2023 and beyond
EU Security and Privacy Laws: What to Expect in 2023 and beyond divya Tue, 03/28/2023 – 06:33 In the modern era, it’s indisputable: data is king. Organizations know it. The more data they collect, the more insightful their decision-making becomes.…
Study: Software Vendors Needed A 3rd-Party Monetization Solution. Here’s Their Experience Using Thales’ Sentinel
Study: Software Vendors Needed A 3rd-Party Monetization Solution. Here’s Their Experience Using Thales’ Sentinel divya Thu, 03/23/2023 – 09:50 It’s 2023, and if you are a software provider, you’ll lose market relevance if you do not monetize your software to…
Study: Software Vendors Needed A 3rd-Party Monetization Solution. Here’s Their Experience Using Thales’ Sentinel.
Study: Software Vendors Needed A 3rd-Party Monetization Solution. Here’s Their Experience Using Thales’ Sentinel. divya Thu, 03/23/2023 – 09:50 It’s 2023, and if you are a software provider, you’ll lose market relevance if you do not monetize your software to…
5 Ways CIAM Ensures a Seamless and Secure Customer Experience
5 Ways CIAM Ensures a Seamless and Secure Customer Experience divya Thu, 03/23/2023 – 05:27 In today’s digital-first world, providing customers with trustworthy, hassle-free interactions is critical to business success. A CIAM solution serves as that ‘first door’ between the…
Self-Sovereign Identities, The Next Step in Privacy-First User Experience
Self-Sovereign Identities, The Next Step in Privacy-First User Experience divya Tue, 03/21/2023 – 06:10 There is a growing momentum around Self-Sovereign Identities (SSI) with real value to be captured by individuals, countries, and businesses. When privacy is at stake, SSI…
Respecting Privacy and Data Protection: World Consumer Rights Day
Respecting Privacy and Data Protection: World Consumer Rights Day divya Wed, 03/15/2023 – 05:44 For the last four decades, March 15th has marked World Consumer Rights Day – a campaign to raise global awareness about the needs and rights of…
Key Points from the US National Cybersecurity Strategy 2023
Key Points from the US National Cybersecurity Strategy 2023 divya Mon, 03/13/2023 – 15:39 On March 2, the Biden administration released its 2023 National Cybersecurity Strategy, an attempt “to secure the full benefits of a safe and secure digital ecosystem…
You Cannot Secure Your Data by Network Penetration Testing
You Cannot Secure Your Data by Network Penetration Testing divya Thu, 03/09/2023 – 06:05 Organisations continue to experience serious data breaches, often causing harm to their customers, society, and their hard-earned reputations. It would seem obvious from the reported data…
Your Cannot Secure Your Data by Network Penetration Testing
Your Cannot Secure Your Data by Network Penetration Testing divya Thu, 03/09/2023 – 06:05 Organisations continue to experience serious data breaches, often causing harm to their customers, society, and their hard-earned reputations. It would seem obvious from the reported data…
How is CIAM different from IAM?
How is CIAM different from IAM? divya Mon, 03/06/2023 – 06:13 Whether shopping online, working remotely, or ordering a ride, digital identities are at the heart of everything we do online. Widespread cloud adoption, flexible work models, and omnichannel communications…
In the fragmented insurance landscape, let’s unify customer experience
In the fragmented insurance landscape, let’s unify customer experience divya Mon, 03/06/2023 – 06:13 You may think of an insurance company as a singularly-focused entity, offering protection for one product. However, the insurance business reaches across a disparate range of…
Europe Leads the Cybersecurity Regulation Dance
Europe Leads the Cybersecurity Regulation Dance divya Thu, 03/02/2023 – 06:58 Europe has emerged as a hub for developing cyber policies, acting to improve software security, and quickly reporting severe breaches. The European Commission has introduced some pretty cutting-edge legislation…
CENTRAL BANK DIGITAL CURRENCIES
CENTRAL BANK DIGITAL CURRENCIES divya Tue, 02/28/2023 – 06:31 CENTRAL BANK DIGITAL CURRENCIES an evolution of money and payments CBDC, or Central Bank Digital Currency, is a trending topic in the financial industry. Let’s examine the basics of CBDC and…
Thales High Speed Encryptors – Delivering on the Promise of 5G
Thales High Speed Encryptors – Delivering on the Promise of 5G divya Wed, 02/22/2023 – 05:40 5G download speeds can reach 10 gigabits per second, up to 100 times faster than 4G, and supports millions more devices with improved coverage…
Private 5G Networks: Thales and Celona Collaborate to Bring Security and Performance to a Modern World
Private 5G Networks: Thales and Celona Collaborate to Bring Security and Performance to a Modern World divya Mon, 02/20/2023 – 06:03 Rapid growth of mobility and business essential applications is driving enterprises to demand more deterministic wireless solutions that address…
Thales and Quantinuum Offer a Trusted Foundation to Help Organizations Begin Creating Quantum Resilience Today
Thales and Quantinuum Offer a Trusted Foundation to Help Organizations Begin Creating Quantum Resilience Today divya Tue, 02/14/2023 – 06:04 To safeguard their users and infrastructure from sophisticated and ever-evolving cybersecurity threats, businesses of all sizes and across all sectors…
The Pain of Double Extortion Ransomware
The Pain of Double Extortion Ransomware divya Thu, 02/16/2023 – 06:10 Ransomware perpetrators are adopting more sophisticated attack techniques with much success. Attackers are increasingly threatening double and triple extortion in addition to ransom demands, putting more pressure on victims…
Thales and Quantinuum Offer a Trusted Foundation to Help Organizations Begin Creating Quantum Resilience Today
Thales and Quantinuum Offer a Trusted Foundation to Help Organizations Begin Creating Quantum Resilience Today divya Tue, 02/14/2023 – 06:04 To safeguard their users and infrastructure from sophisticated and ever-evolving cybersecurity threats, businesses of all sizes and across all sectors…
How do you secure the Big Game?
How do you secure the Big Game? divya Thu, 02/09/2023 – 10:08 In a matter of days, the world will be watching as the Philadelphia Eagles and the Kansas City Chiefs square off in the much-anticipated Superbowl 57 at State…
Safer Internet Day 2023: Empowering Kids and Families for a Safer Internet
Safer Internet Day 2023: Empowering Kids and Families for a Safer Internet divya Tue, 02/07/2023 – 06:44 Save the date for Safer Internet Day 2023, which will take place on Tuesday, 7 February 2023, the 20th edition of the campaign!…
How do you secure a Super Bowl?
How do you secure a Super Bowl? divya Thu, 02/09/2023 – 10:08 In a matter of days, the world will be watching as the Philadelphia Eagles and the Kansas City Chiefs square off in the much-anticipated Superbowl 57 at State…
Safer Internet Day 2023: Empowering Kids and Families for a Safer Internet
Safer Internet Day 2023: Empowering Kids and Families for a Safer Internet divya Tue, 02/07/2023 – 06:44 Save the date for Safer Internet Day 2023, which will take place on Tuesday, 7 February 2023, the 20th edition of the campaign!…
How to Address the Requirements of Personal Data Protection (PDP) Law of Indonesia
How to Address the Requirements of Personal Data Protection (PDP) Law of Indonesia divya Thu, 02/02/2023 – 06:35 In response to the increased number of attacks targeting the personal data of millions of Indonesian citizens, the government passed the first…
How to Address the Requirements of Personal Data Protection (PDP) Law of Indonesia
How to Address the Requirements of Personal Data Protection (PDP) Law of Indonesia divya Thu, 02/02/2023 – 06:35 In response to the increased number of attacks targeting the personal data of millions of Indonesian citizens, the government passed the first…
Building a Quantum-Safe Blockchain Today
Building a Quantum-Safe Blockchain Today divya Tue, 01/31/2023 – 06:18 Public-key cryptography is used to establish a distributed consensus of trust, which is essential for financial Blockchain solutions. While the chain itself is relatively secure, the “wallets” at the endpoints…
Data Privacy Legislation: What You Should Be Looking for in 2023
Data Privacy Legislation: What You Should Be Looking for in 2023 divya Wed, 01/25/2023 – 06:31 Comprehensive data protection laws exist across the globe. While each law is different, there are many commonalities in terms of the rights, obligations, and…