
Why businesses need IAM to push their zero trust frameworks forward
Many organizations are finding themselves between a rock and a hard place when it comes to the security of their digital transformation strategies. On the one hand, the number …
Keyfactor and Thales launch Keyfactor Code Assure, providing secure code signing
Keyfactor, a leading provider of secure digital identity management solutions, announced a new integration with Thales that combines Keyfactor’s code signing platform with the …

Government embracing digital transformation but struggling to implement data security
The push towards digital transformation in the U.S. government is putting sensitive data at risk, according to a Thales research conducted by analyst firm IDC. The 2019 Thales …
Thales unveils payShield 10K, a new payment hardware security module
Thales, a leader in critical information systems, cybersecurity and data protection, announces the availability of a next-generation payment hardware security module (HSM), …
Entrust Datacard acquires nCipher, a GP HSM business from Thales
Entrust Datacard, a leading provider of trusted identity and secure issuance technology solutions, announced that the company has signed a definitive agreement to acquire …
Verint and Thales join forces to deliver cyber threat intelligence approach
Verint Systems and Thales formed a partnership to create a Cyber Security Threat Intelligence approach for governments, enterprises, and critical infrastructures in Europe. …
NanoLock Security selected to Thales CYBER@Station F program
NanoLock Security announced its selection into the CYBER@Station F program by Thales. Thales chose NanoLock based on the company’s CPU-agnostic, edge and IoT device …

Retail data breaches continue to reach new highs
Thales announced the results of its 2018 Thales Data Threat Report, Retail Edition. According to U.S. retail respondents, 75% of retailers have experienced a breach in the …
Thales and Device Authority healthcare IoT solution ensures device and data security for medical devices
Thales and Device Authority announce a jointly developed solution to ensure the authentication of IoT devices and the confidentiality and integrity of the data they rely on – …

Data breaches at an all time high: How are businesses protecting themselves?
Digitally transformative technologies are shaping the way organisations do business and moving them to a data-driven world, with 94% of organisations using sensitive data in …

Infosec expert viewpoint: Connected car security
A recent Irdeto Global Connected Car Survey found that of the consumers who plan on purchasing a vehicle in the future, 53% are likely to research the car’s ability to protect …

A third of US businesses do not feel prepared for GDPR deadline
New research by Censuswide captures the preparedness levels of organizations in Europe and the United States for the May 2018 GDPR compliance deadline, as well as their …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)