Posted on 28 March 2013 by Thales DIS
Explore how Amazon Web Services is leveraging Gemalto’s SafeNet Hardware Security Modules to offer AWS CloudHSM, the company’s innovative cloud security solution.
Posted on 18 March 2014 by Thales DIS
In our six-part series, ‘Securing the Breach’, we will take you on a journey – starting with the current state of data security and how we got here.
Posted on 01 April 2014 by Thales DIS
Find out the three steps that every company should take to mitigate the overall cost and adverse consequences that result from a security breach.
Posted on 16 April 2014 by Thales DIS
In the third installment of Securing the Breach, we take a closer look at the types of data that need encryption, and specifically “data at rest.”
Posted on 19 May 2014 by Thales DIS
In the fourth part in our Securing the Breach series, we explore why high speed encryption is crucial for protecting sensitive data in motion.
Posted on 22 July 2014 by Thales DIS
To ensure security, organizations must establish a centralized policy around the protection, storage, back-up and organization of encryption keys.