cpl.thalesgroup.com Open in urlscan Pro
54.244.122.2  Public Scan

Submitted URL: https://response.insights-sverige.com/link/kbmg434sp3ww155dpw58g1diqwhunp5eept8e7mkctyinh4uktyo
Effective URL: https://cpl.thalesgroup.com/blog
Submission: On May 11 via api from IE — Scanned from DE

Form analysis 2 forms found in the DOM

GET /blog/feed

<form class="views-exposed-form" data-drupal-selector="views-exposed-form-blog-block-1" action="/blog/feed" method="get" id="views-exposed-form-blog-block-1" accept-charset="UTF-8" data-once="exposed-form" __bizdiag="950074687" __biza="WJ__">
  <div class="js-form-item form-item js-form-type-textfield form-item-combine js-form-item-combine">
    <label for="edit-combine--hC5cxlXX0F4">Combine fields filter</label>
    <input data-drupal-selector="edit-combine" type="text" id="edit-combine--hC5cxlXX0F4" name="combine" value="" size="30" maxlength="128" class="form-text">
  </div>
  <div class="js-form-item form-item js-form-type-select form-item-created js-form-item-created">
    <label for="edit-created--4wxZtT2gt5U">Year</label>
    <select data-drupal-selector="edit-created" id="edit-created--4wxZtT2gt5U" name="created" class="form-select">
      <option value="All" selected="selected">- Any -</option>
      <option value="1">2021</option>
      <option value="2">2020</option>
      <option value="3">2019</option>
      <option value="4">2018</option>
      <option value="5">2017</option>
      <option value="6">2016</option>
      <option value="7">2015</option>
      <option value="8">2014</option>
      <option value="9">2013</option>
      <option value="10">2012</option>
      <option value="11">2011</option>
      <option value="12">2010</option>
      <option value="13">2009</option>
    </select>
  </div>
  <div class="js-form-item form-item js-form-type-select form-item-field-category-target-id js-form-item-field-category-target-id">
    <label for="edit-field-category-target-id--5flE5gsek9U">Category (field_category)</label>
    <select data-drupal-selector="edit-field-category-target-id" multiple="multiple" name="field_category_target_id[]" id="edit-field-category-target-id--5flE5gsek9U" size="9" class="form-select">
      <option value="32">Access Control</option>
      <option value="61">IoT</option>
      <option value="56">Government</option>
      <option value="57">Healthcare</option>
      <option value="58">Hipaa</option>
      <option value="1061">Identity &amp; Access Management</option>
      <option value="152">Information and Security Research</option>
      <option value="59">Insider Threat</option>
      <option value="60">Internet Of Things</option>
      <option value="62">Key management</option>
      <option value="54">Encryption Key Management</option>
      <option value="63">Mobile Payments</option>
      <option value="64">Privileged User</option>
      <option value="65">Regulation and compliance</option>
      <option value="66">SaaS Encryption</option>
      <option value="67">Security Intelligence</option>
      <option value="31">Software Monetization</option>
      <option value="68">State Data Breach Notification</option>
      <option value="69">Teradata Encryption</option>
      <option value="55">GDPR</option>
      <option value="53">Encryption</option>
      <option value="33">Application Encryption</option>
      <option value="42">Compliance</option>
      <option value="34">APT</option>
      <option value="35">Big Data</option>
      <option value="36">Brexit</option>
      <option value="37">Channel</option>
      <option value="38">Cloud Computing</option>
      <option value="39">Cloud Encryption Gateway</option>
      <option value="40">Cloud security</option>
      <option value="41">Cloud Storage Encryption</option>
      <option value="43">Cyber War</option>
      <option value="52">Docker</option>
      <option value="44">Data Breach</option>
      <option value="45">Data Breach Disclosure</option>
      <option value="46">Data Firewall</option>
      <option value="47">Data Masking</option>
      <option value="48">Data Mining</option>
      <option value="49">Data security</option>
      <option value="50">Database Encryption</option>
      <option value="51">Digital payments</option>
      <option value="70">Tokenization</option>
    </select>
  </div>
  <div data-drupal-selector="edit-actions" class="form-actions js-form-wrapper form-wrapper" id="edit-actions--1JfKX943JHI"><input data-drupal-selector="edit-submit-blog-edorvj87w1s" type="submit" id="edit-submit-blog--edOrvJ87W1s" value="Apply"
      class="button js-form-submit form-submit">
  </div>
</form>

GET /search

<form method="GET" action="/search" __bizdiag="-906336856" __biza="WJ__">
  <input type="text" class="search-input" name="search" placeholder="Let’s find what you’re looking for...">
  <button type="submit" class="btn-default">Search</button>
</form>

Text Content

This website, like almost all websites, uses cookies to help improve your online
experience. By continuing to browse this site, you consent to our use of
cookies. Cookie Policy
Continue

node/588

 
 
 
 * Products
    * Products
    * Products Overview
    * Data Protection
       * Data Protection
       * Data Protection Overview
       * Data Discovery & Classification
       * Data at Rest Encryption
          * Data at Rest Encryption
          * Data at Rest Encryption
          * Data Security Platform
          * Intelligent Protection
          * Transparent Encryption
          * Application Data Protection
          * Tokenization
          * Database Protection
          * Batch Data Transformation | Static Data Masking
          * Selecting the Right Encryption Approach
      
       * Key Management
          * Key Management
          * Key Management
          * CipherTrust Manager
          * Data Security Manager
          * CipherTrust Cloud Key Manager
          * Enterprise Key Management
      
       * Hardware Security Modules
          * Hardware Security Modules
          * Hardware Security Modules
          * General Purpose HSMs
          * Payment HSMs
          * Luna Cloud HSM Services
      
       * Data Protection on Demand
          * Data Protection on Demand
          * Data Protection on Demand
          * Services
          * How it Works
          * Partners
          * Pricing
          * Sign Up Now
      
       * Network Encryption
       * Secure File Sharing
      
      Risk Management Strategies for Digital Processes with HSMs
      
      Security architects are implementing comprehensive information risk
      management strategies that include integrated Hardware Security Modules
      (HSMs). Reduce risk and create a competitive advantage.
      
      Get the White Paper
    * Access Management & Authentication
       * Access Management & Authentication
       * Access Management
          * Access Management
          * Access Management
          * SafeNet Trusted Access
          * Identity-as-a-Service
          * SAML Authentication
      
       * Cloud SSO
          * Cloud SSO
          * Cloud SSO
          * SSO Application Catalog
      
       * Authentication
          * Authentication
          * Authentication
          * Authentication as a Service
          * Authenticators
          * Certificate-Based PKI USB Authenticators
          * Certificate-Based Smart Cards
          * FIDO Devices
          * OTP Authenticators
          * Tokenless Authentication
          * On-Prem Management Platforms
          * Security Apps
          * Smart Card Readers
          * Passwordless Authentication
      
       * Sign Up Now - STA Free Trial
       * STA Demo
      
      Access Management Handbook
      
      Get everything you need to know about Access Management, including the
      difference between authentication and access management, how to leverage
      cloud single sign on.
      
      Get the eBook
    * Software Monetization
       * Software Monetization
       * Software Monetization Overview
       * Sentinel Rights Management System - RMS
       * Sentinel Entitlement Management System - EMS
       * Sentinel License Development Kit - LDK
       * Automate Software Updates - Sentinel Up
       * Low Footprint Commercial Licensing - Sentinel Fit
       * Software License & Copy Protection - Sentinel SL and CL
       * All Software Licensing Products
      
      How to Get Software Licensing Right The First Time
      
      Check out our practical guide to navigating the process of licensing,
      delivering, and protecting your software.
      
      Get the White Paper
   
   How We Can Help
   
   You can rely on Thales to help protect and secure access to your most
   sensitive data and software wherever it is created, shared or stored.
   
   payShield 10K
   
   The hardware security module that secures the world's payments.
   
   Learn More
 * Solutions
    * Solutions
    * Solutions Overview
    * By Use Case
       * By Use Case
       * 5G Security
       * Access Security
          * Access Security
          * Access Security
          * Secure Remote Access
          * Secure VPN Access
          * Secure Cloud Access
          * VDI Security Solutions
          * 2FA Solutions
          * Web and Cloud SSO
          * Physical & Logical Access Control
          * MFA for Cyber Insurance
      
       * Blockchain
       * Cloud Security
          * Cloud Security
          * Cloud Security
          * BYOE
          * Amazon Web Services
          * Google Cloud Security
          * Microsoft Azure
          * Cloud SSO
          * Cloud Data Encryption
          * Luna HSMs – Hybrid, On-Premises and Cloud HSM
          * Microsoft Double Key Encryption (DKE)
      
       * Data Security & Encryption
          * Data Security & Encryption
          * Data Security & Encryption
          * Advanced Persistent Threats (APTs)
          * Big Data Security
          * Container Security
          * Database Security | Database Encryption
          * Docker Encryption
          * MongoDB Encryption
          * MS SQL Server Encryption
          * NoSQL Encryption
          * Oracle Database Encryption
          * PostgreSQL Database Encryption
          * SAP Data Security
          * Securing Unstructured Files
          * TDE Key Management
      
       * Digital Transformation
       * IoT Security
          * IoT Security
          * IoT Security
          * Smart Grid Security
          * IoT Connected Car
          * IoT Secure Manufacturing
          * IoT Healthcare
      
       * Payment & Transactions
          * Payment & Transactions
          * Payment & Transactions
          * Secure Payments
          * Point-to-Point Encryption
          * Document Signing
          * EMV & Payment Card Issuance
          * Host Card Emulation
          * Mobile Card Payments
          * mPOS
          * Payment Processing
          * Secure Credit Card & Pin Management
      
       * PKI Credential Management
          * PKI Credential Management
          * PKI Credential Management
          * PKI Middleware
          * PKI Authentication
          * PKI Security
      
       * PKI Security Solutions
          * PKI Security Solutions
          * PKI Security Solutions
          * TLS/SSL Key Security
          * Code Signing
          * Secure Digital Signatures
          * Electronic Invoicing
          * DNS Security
          * Email Encryption
      
       * Quantum
          * Quantum
          * Quantum
          * Post-Quantum Crypto Agility Tool
      
       * Ransomware Solutions
       * Remote Workforces Challenges
       * Software Monetization
          * Software Monetization
          * Software Monetization
          * Software License Management
          * Entitlement Management
          * Software Packaging & Pricing
          * Software Usage Tracking & Reporting
          * Software Protection & Licensing
          * Capture Revenue Opportunities
      
       * Zero Trust Security
      
      Best Practices for Secure Cloud Migration
      
      It's a Multi-Cloud World. Thales can help secure your cloud migration.
      
      GET THE WHITE PAPER
    * By Industry
       * By Industry
       * Automotive
       * Education
       * Federal Government
       * Financial Services
       * Government
       * Healthcare
       * Insurance Providers
       * Law Enforcement
       * Media and Entertainment
       * Retail
       * SaaS Providers / Service Providers
       * State and Local Government
      
      Best Practices for Secure Cloud Migration
      
      It's a Multi-Cloud World. Thales can help secure your cloud migration.
      
      GET THE WHITE PAPER
    * By Compliance
       * By Compliance
       * Global
          * Global
          * Basel Compliance Solutions
          * Data Breach Notification Laws
          * Data Sovereignty
          * GDPR
          * ISO 27799:2016 Compliance
          * ISO/IEC 27002:2013 Compliance
          * PCI DSS
          * PCI HSM
          * Swift CSC
          * Validations and Certifications
      
       * Americas
          * Americas
          * Brazil - LGPD
          * CCPA (California Consumer Privacy Act)
          * CJIS
          * FDA/DEA - EPCS
          * FedRamp
          * FISMA
          * FIPS 199 and FIPS 200
          * FIPS 140-2
          * FIPS 140-3
          * GLBA
          * HIPAA
          * Mexico - Data Protection Law
          * NAIC Insurance Data Security Model Law Compliance
          * New York State Cybersecurity Requirements for Financial Services
            Companies Compliance
          * NCUA Regulatory Compliance
          * NIST 800-53, Revision 4
          * PIPEDA Compliance
          * SOX
          * STIR/SHAKEN
      
       * EMEA
          * EMEA
          * DEFCON 658
          * ECC
          * eIDAS
          * GDPR
          * PSD2
          * Schrems II
          * South Africa POPI Act
      
       * APAC
          * APAC
          * Australia Privacy Amendment
          * Japan My Number Compliance
          * J-Sox
          * Monetary Authority of Singapore
          * Philippines Data Privacy Act of 2012
          * South Korea's PIPA
          * UIDAI's Aadhaar Number Regulation Compliance
      
      Protect Your Organization from Data Breach Notification Requirements
      
      Data breach disclosure notification laws vary by jurisdiction, but almost
      universally include a "safe harbor" clause.
      
      LEARN MORE
   
   Solutions to Secure Your Digital Transformation
   
   Whether it's securing the cloud, meeting compliance mandates or protecting
   software for the Internet of Things, organizations around the world rely on
   Thales to accelerate their digital transformation.
   
   Implementing Strong Authentication for Office 365
   
   Mitigate the risk of unauthorized access and data breaches.
   
   Learn More
 * Partners
    * Partners
    * Partners Overview
    * Find a Partner
    * Become a Partner
    * Channel Partners
    * Managed Service Providers
    * OEM Partners
    * Technology Partners
    * Partner Portal Login
   
   Thales Accelerate
   Partner Network
   
   Thales Partner Ecosystem includes several programs that recognize, rewards,
   supports and collaborates to help accelerate your revenue and differentiate
   your business. Provide more value to your customers with Thales's Industry
   leading solutions. Learn more to determine which one is the best fit for you.
   
   The Thales Accelerate Partner Network provides the skills and expertise
   needed to accelerate results and secure business with Thales technologies.
   
   Get the Brochure
 * Developers
 * Resources
    * Area of Interest
    * Encryption
       * Resource Type
       * White Papers
       * eBooks
       * Case Studies
       * Infographics
       * Webinars
       * Videos
       * Security Research
       * Podcasts
       * TalkingTrust Video Series
      
      Gartner Report: Select the Right Key Management as a Service to Mitigate
      Data Security and Privacy Risks in the Cloud
      
      Organizations must review their protection and key management provided by
      each cloud service provider.
      
      Get the Report
    * Access Management
       * Resource Type
       * White Papers
       * eBooks
       * Case Studies
       * Infographics
       * Webinars
       * Videos
       * Security Research
       * Podcasts
      
      Gartner's Market Guide for User Authentication
      
      How does user authentication relate to other identity corroboration
      approaches?
      
      Get the Report
    * Software Monetization
       * Resource Type
       * Blog
       * FAQ
       * White Papers
       * Case Studies
       * Infographics
       * Webinars
       * Business Value Calculator
      
      Navigate The Process of Licensing, Delivering, and Protecting Your
      Software
      
      Check out our practical guide to navigating the process of licensing,
      delivering, and protecting your software.
      
      Get the White Paper
    * Blog
   
   Explore Thales's comprehensive resources for cloud, protection and licensing
   best practices.
   A Global Leader in Data Security
   
   The largest companies and most respected brands in the world rely on Thales
   to protect their most sensitive data.
   
   GET THE BROCHURE

 * 
 * Support
    * Customer Support
    * Software Monetization
       * Drivers & Downloads
       * Security Updates
       * Product Announcements / Training
   
    * Customers
       * Activate a Product / Support Portal
   
    * Data Protection
       * Security Updates
       * Product Announcements
       * Training Services
       * Technical Training Calendar
       * Professional Services

 * About
    * About Us
    * Leadership
    * Newsroom
    * News Coverage
    * Events
    * Customers
    * Industry Associations & Standards Organizations
    * Information Security Research

 * Contact Sales
    * Contact Encryption
    * Contact Access Management
    * Contact Software Monetization


CLOUD PROTECTION & LICENSING BLOG

Stay up to date with data security best practices and industry news

Previous
Liz Kelly | May 2

5 LESSONS STAR WARS CAN TEACH US ABOUT CYBERSECURITY

Read More
April Burghardt | April 28

ANATOMY OF A QUANTUM ATTACK

Read More
Marcelo Delima | April 26

HOW TO PROTECT HEALTHCARE AND LIFE-SCIENCES DATA FROM A CYBER ATTACK PANDEMIC

Read More
Chris Martin | May 10

IS THE DEMISE OF OTP AUTHENTICATION IMMINENT?

Learn More
Todd Moore | May 9

ONE YEAR LATER: WHAT HAVE WE LEARNED SINCE THE COLONIAL PIPELINE ATTACK

Read More
Brian Grant | May 5

KEY REPATRIATION, THE FIRST STEP IN RE-ESTABLISHING CLOUD DATA DIGITAL
SOVEREIGNTY

Read More
Liz Kelly | May 2

5 LESSONS STAR WARS CAN TEACH US ABOUT CYBERSECURITY

Read More
April Burghardt | April 28

ANATOMY OF A QUANTUM ATTACK

Read More
Marcelo Delima | April 26

HOW TO PROTECT HEALTHCARE AND LIFE-SCIENCES DATA FROM A CYBER ATTACK PANDEMIC

Read More
Chris Martin | May 10

IS THE DEMISE OF OTP AUTHENTICATION IMMINENT?

Learn More
Todd Moore | May 9

ONE YEAR LATER: WHAT HAVE WE LEARNED SINCE THE COLONIAL PIPELINE ATTACK

Read More
Brian Grant | May 5

KEY REPATRIATION, THE FIRST STEP IN RE-ESTABLISHING CLOUD DATA DIGITAL
SOVEREIGNTY

Read More
Next
 * 1
 * 2

Select Category
 * Software Monetization
 * Access Control
 * Application Encryption
 * APT
 * Big Data
 * Brexit
 * Channel
 * Cloud Computing
 * Cloud Encryption Gateway
 * Cloud security
 * Cloud Storage Encryption
 * Compliance
 * Cyber War
 * Data Breach
 * Data Breach Disclosure
 * Data Firewall
 * Data Masking
 * Data Mining
 * Data security
 * Database Encryption
 * Digital payments
 * Docker
 * Encryption
 * Encryption Key Management
 * GDPR
 * Government
 * Healthcare
 * Hipaa
 * Insider Threat
 * Internet Of Things
 * IoT
 * Key management
 * Mobile Payments
 * Privileged User
 * Regulation and compliance
 * SaaS Encryption
 * Security Intelligence
 * State Data Breach Notification
 * Teradata Encryption
 * Tokenization
 * Information and Security Research
 * Identity & Access Management

Archive
 * Archive
 * 2021
 * 2020
 * 2019
 * 2018
 * 2017
 * 2016
 * 2015
 * 2014
 * 2013
 * 2012
 * 2011
 * 2010
 * 2009

Search
Combine fields filter
Year - Any -2021202020192018201720162015201420132012201120102009
Category (field_category) Access ControlIoTGovernmentHealthcareHipaaIdentity &
Access ManagementInformation and Security ResearchInsider ThreatInternet Of
ThingsKey managementEncryption Key ManagementMobile PaymentsPrivileged
UserRegulation and complianceSaaS EncryptionSecurity IntelligenceSoftware
MonetizationState Data Breach NotificationTeradata
EncryptionGDPREncryptionApplication EncryptionComplianceAPTBig
DataBrexitChannelCloud ComputingCloud Encryption GatewayCloud securityCloud
Storage EncryptionCyber WarDockerData BreachData Breach DisclosureData
FirewallData MaskingData MiningData securityDatabase EncryptionDigital
paymentsTokenization

Chris Martin May 10, 2022
Is the demise of OTP authentication imminent?

Digital transformation and the increasing reliance on remote business continue
to accelerate the adoption of new …

Read More
Todd Moore May 9, 2022
One Year Later: What Have We Learned Since the Colonial Pipeline Attack

It is hard to believe that it has already been one year since the…

Read More
Brian Grant May 5, 2022
Key Repatriation, the first step in re-establishing Cloud Data Digital
Sovereignty

Repatriation is the process of returning an asset, an item of symbolic value, or
a person—voluntarily or forcibly—to its owner or their place of origin or…

Read More
Liz Kelly May 4, 2022
5 Lessons Star Wars Can Teach Us About Cybersecurity

A long time ago – in 1977 to be precise - in a film theatre far, far away, a
film called “Star Wars” was released, which took the world by storm and changed
sci-fi, cinema, and…

Read More
April Burghardt April 28, 2022
Anatomy of a Quantum Attack

Next-generation cyberattacks are often summarized as ransomware,
man-in-the-middle, brute-force, phishing, insider, or malware attacks. Each
present a unique set of challenges…

Read More
Marcelo Delima April 26, 2022
How to protect healthcare and life-sciences data from a cyber attack pandemic

Once slow to adopt new technologies, healthcare-related industries have been
rapidly embracing digitalization to enable patient-centric care that is more
effective for patients…

Read More

PAGINATION

 * Current page 1
 * Page 2
 * Page 3
 * Page 4
 * Page 5
 * Page 6
 * Page 7
 * Page 8
 * Page 9
 * …
 * Next page Next ›
 * Last page Last »

Subscribe to our RSS Feed

cpl.thalesgroup.com



Visit our parent site at

www.thalesgroup.com
 * Products
   * Data Protection
   * Access Management & Authentication
   * Software Monetization

 * Solutions
   * By Use Case
   * By Industry
   * By Compliance

 * Partners
   * Find a Partner
   * Become a Partner
   * Partner Portal Login

 * Resources
   * Resources Library
   * Blog
   * Podcasts

 * Support
   * Customer Support
   * Training Services

 * About
   * Contact Us
   * India E-Waste Program
   * Newsroom

SUBSCRIBEGet the latest data protection and access management resources and
insights delivered right to your inbox.
Copyright © 2022 Thales. All Rights Reserved
 * * Privacy Policy
   *   Disclaimer
   *   EU Commitments
   *   Sitemap
   *   Cookie Policy
   *   Terms & Conditions
   *  Do Not Sell My Personal Information

Search
Partners Resources Blogs Sentinel Drivers