Tag: Thales CPL Blog Feed

Happy Compliance Officer Day!

Happy Compliance Officer Day! madhav Tue, 09/26/2023 – 05:57 <div><p>The summer vacation seems a distant memory and my wife and I are firmly back in the routine of our kids being at school – with the added benefiting of the…

Maintaining the Optimal Blend for Digital Success

Maintaining the Optimal Blend for Digital Success madhav Tue, 08/15/2023 – 04:57 Operating in an increasingly challenging digital landscape, organizations must maintain a delicate balance between user experience, security, and privacy in every interaction. Customer Identity & Access Management (CIAM)…

Uncover Your Cybersecurity Blind Spots

Uncover Your Cybersecurity Blind Spots madhav Thu, 08/03/2023 – 05:59 Cybersecurity is a strategic risk that should be managed at the highest levels of an organization. In fact, the World Economic Forum’s Global Risk Report 2023 again ranked wide-spread cybercrime…

How to Meet Phishing-Resistant MFA Requirements

How to Meet Phishing-Resistant MFA Requirements madhav Tue, 08/01/2023 – 05:18 Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It’s a sensible decision to utilize MFA. The bigger question is, what…

How to Meet Phishing-Resistant MFA

How to Meet Phishing-Resistant MFA madhav Tue, 08/01/2023 – 05:18 Incorporating multi-factor authentication (MFA) as a fundamental security measure for your organization is now considered standard practice. It’s a sensible decision to utilize MFA. The bigger question is, what type…

A Guide to Key Management as a Service

A Guide to Key Management as a Service madhav Wed, 06/14/2023 – 11:29 As companies adopt a cloud-first strategy and high-profile breaches hit the headlines, securing sensitive data has become a paramount business concern. The most effective way to ensure…

The Rise of the Sovereign Cloud

The Rise of the Sovereign Cloud sparsh Thu, 05/25/2023 – 04:04 One of the big ironies about data on the internet is that once the goal of achieving a centreless web of data communication (the internet itself) had been developed…

8 Key Components of a CIAM Platform

8 Key Components of a CIAM Platform sparsh Tue, 05/23/2023 – 04:15 Customer Identity and Access Management (CIAM) is essentially developed to improve the customer experience (CX), ensure the highest level of security, protect customer data, and support the management…

How is CIAM different from IAM?

How is CIAM different from IAM? divya Mon, 03/06/2023 – 06:13 Whether shopping online, working remotely, or ordering a ride, digital identities are at the heart of everything we do online. Widespread cloud adoption, flexible work models, and omnichannel communications…

Europe Leads the Cybersecurity Regulation Dance

Europe Leads the Cybersecurity Regulation Dance divya Thu, 03/02/2023 – 06:58 Europe has emerged as a hub for developing cyber policies, acting to improve software security, and quickly reporting severe breaches. The European Commission has introduced some pretty cutting-edge legislation…

CENTRAL BANK DIGITAL CURRENCIES

CENTRAL BANK DIGITAL CURRENCIES divya Tue, 02/28/2023 – 06:31 CENTRAL BANK DIGITAL CURRENCIES an evolution of money and payments CBDC, or Central Bank Digital Currency, is a trending topic in the financial industry. Let’s examine the basics of CBDC and…

The Pain of Double Extortion Ransomware

The Pain of Double Extortion Ransomware divya Thu, 02/16/2023 – 06:10 Ransomware perpetrators are adopting more sophisticated attack techniques with much success. Attackers are increasingly threatening double and triple extortion in addition to ransom demands, putting more pressure on victims…

Building a Quantum-Safe Blockchain Today

Building a Quantum-Safe Blockchain Today divya Tue, 01/31/2023 – 06:18 Public-key cryptography is used to establish a distributed consensus of trust, which is essential for financial Blockchain solutions. While the chain itself is relatively secure, the “wallets” at the endpoints…