Thales Trusted Cyber Technologies (TCT) Government IT News

Click here to view current Thales TCT's news.

Back to Top

November 04, 2024
Preparing for the Intersection of AI, Quantum Computing

Preparing for the Intersection of AI, Quantum Computing

The excitement over artificial intelligence may have hit its high point over the last few months so now for many organizations, it’s time to ask the hard questions of how ...

October 21, 2024
Preparing for the Intersection of AI, Quantum Computing

Preparing for the Intersection of AI, Quantum Computing

The excitement over artificial intelligence may have hit its high point over the last few months so now for many organizations, it’s time to ask the hard questions of how ...

March 14, 2022
Preparing for the Intersection of AI, Quantum Computing

milCloud 2.0 Data Migration Highlights the Need for Cloud Security Best Practices

The Defense Information Systems Agency (DISA) is ending its hybrid cloud service program milCloud 2.0 this summer, leaving agencies currently using the platform scrambling to ...

February 22, 2022
Preparing for the Intersection of AI, Quantum Computing

How-to Guide for Compliance with the National Security Memo on Cyber

On January 19, 2022, the White House issued a National Security Memorandum (NSM) to improve the cybersecurity of National Security, Department of Defense, and Intelligence ...

December 16, 2021
Preparing for the Intersection of AI, Quantum Computing

Thales Trusted Cyber Technologies Launch Announcement

As of January 1, 2020, SafeNet Assured Technologies, LLC. and Thales Cloud Protection & Licensing, Federal will unite under a new name as Thales Trusted Cyber Technologies ...

August 31, 2021
Preparing for the Intersection of AI, Quantum Computing

Biden's cyber EO moves past the 'castle and moat' strategy

President Biden's May 2021 executive order on cybersecurity is pushing agencies to move past a castle and moat security posture. Here's what you need to know to drive that ...

May 24, 2021
Preparing for the Intersection of AI, Quantum Computing

4 steps to reducing ransomware damage

Access control and data encryption management is the most effective protection – not only from ransomware, but from insider threats, rogue processes, malware and more.

April 19, 2021
Preparing for the Intersection of AI, Quantum Computing

Thales Trusted Cyber Technologies Luna T-Series Hardware Security Modules Receive FIPS 140-2 Level 3 Validation

Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced that its Luna T-Series Hardware Security Modules (HSMs) have ...