Key Management and Payments Security Blog - Thales e-Security

Data Security and Key Management - Thales e-Security

  • Three reasons why your business should take the GDPR seriously

    By | May 25, 2016

    Today, the EU General Data Protection Regulation (GDPR) becomes law and the 2-year countdown has begun for organisations to fully comply with the new laws designed to harmonise data protection across the continent. Heralded as “a major step forward for consumer protection”, the GDPR seeks to help consumers benefit by defining a single set of rules, focused squarely on the sovereign privacy rights of people, no matter where in the EU they are. But what does it actually mean for organisations that maintain data? And why should they take it seriously?

    Continue Reading
  • Sign on the digital line

    By | May 19, 2016

    The use of signatures to authenticate important documents has been around for centuries. But as we move towards a more paperless society, signing on the dotted line takes on a still relatively new form, which brings with it unique challenges. As electronic documents and other digital assets proliferate across organizations, new types of control are also needed.

    Continue Reading
  • In-app payments: who foots the fraud bill?

    By | May 17, 2016

    Ticketmaster has just begun selling event tickets directly on Facebook. While this a great perk for both users making a convenient in-app purchase and advertisers wanting to link social campaigns directly to revenue (rather than just 'likes' and followers), there’s a huge security and trust issue that’s being overlooked: authentication.

    Continue Reading
  • Knock, knock, knocking on your network’s door – security and IoT device enrollment

    By | May 13, 2016

    security knockerIn 1973, Bob Dylan released his hit song Knocking on Heaven’s Door. In 2016, increasing number of devices connected to the Internet are now knocking on your closed network domain door. Ensuring you only let in those devices that are legitimate is critically important. To that end enterprises must be vigilant of the security risks and challenges that the new Internet of Things (IoT) presents. While the provisioning of identification credentials for controlled device authentication has received much attention among security professionals, an equally important but less often discussed aspect is the enrollment of devices within closed network domains. 

    Continue Reading
  • Protecting critical infrastructure against the threat of cyberattacks

    By | May 11, 2016
    critical infratsructure

    Cyberattacks are typically carried out to steal money, corporate secrets, and personal identities – using information in the virtual world to profit in the real world. Slowly though, the realization is growing that as more and more of the real world is made virtual, increasingly interesting and serious physical targets are becoming the targets of cyberattack. According to the head of the World Energy Council, the UK is now at risk of a potentially devastating attack against its energy infrastructure.

    Continue Reading
View more

About this blog

Welcome to our new merged blog site, featuring key management and payments security focused content previously hosted on and

As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

Thales has been applying data protection and key management expertise to the worldwide payments industry for over 25 years. Our solutions secure retail and corporate banking, integrate with all widely used credit/debit applications, and include the world's best-selling EMV data preparation system and complete PIN management for card issuers.