November 04, 2024
|
Preparing for the Intersection of AI, Quantum ComputingThe excitement over artificial intelligence may have hit its high point over the last few months so now for many organizations, it’s time to ask the hard questions of how ... |
October 21, 2024
|
Preparing for the Intersection of AI, Quantum ComputingThe excitement over artificial intelligence may have hit its high point over the last few months so now for many organizations, it’s time to ask the hard questions of how ... |
March 14, 2022
|
milCloud 2.0 Data Migration Highlights the Need for Cloud Security Best PracticesThe Defense Information Systems Agency (DISA) is ending its hybrid cloud service program milCloud 2.0 this summer, leaving agencies currently using the platform scrambling to ... |
February 22, 2022
|
How-to Guide for Compliance with the National Security Memo on CyberOn January 19, 2022, the White House issued a National Security Memorandum (NSM) to improve the cybersecurity of National Security, Department of Defense, and Intelligence ... |
December 16, 2021
|
Thales Trusted Cyber Technologies Launch AnnouncementAs of January 1, 2020, SafeNet Assured Technologies, LLC. and Thales Cloud Protection & Licensing, Federal will unite under a new name as Thales Trusted Cyber Technologies ... |
August 31, 2021
|
Biden's cyber EO moves past the 'castle and moat' strategyPresident Biden's May 2021 executive order on cybersecurity is pushing agencies to move past a castle and moat security posture. Here's what you need to know to drive that ... |
May 24, 2021
|
4 steps to reducing ransomware damageAccess control and data encryption management is the most effective protection – not only from ransomware, but from insider threats, rogue processes, malware and more. |
April 19, 2021
|
Thales Trusted Cyber Technologies Luna T-Series Hardware Security Modules Receive FIPS 140-2 Level 3 ValidationThales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced that its Luna T-Series Hardware Security Modules (HSMs) have ... |