Key Management and Payments Security Blog - Thales e-Security

Data Security and Key Management - Thales e-Security

  • BYOK For Everyone: Choose Your Own Cloud

    By | August 19, 2016

    byok for everyoneLast year we hit a turning point in cloud adoption for applications processing sensitive data. According to our latest Ponemon/Thales Global Encryption Trends Study, for the first time more enterprises are sending sensitive data to the cloud than deferring out of fear over security risks.

    Continue Reading
  • The GDPR and encryption: more detail needed

    By | August 15, 2016

    gdpr blogIn the recently released General Data Protection Regulation (GDPR) data encryption is stated as a means to protect personal data. E.g. Article 32, Security of Personal Data, states that the "controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including…the pseudonymisation and encryption of personal data."

    Continue Reading
  • The driving force behind F1 Williams’ cyber security strategy

    By | August 19, 2016

    F1 williamsIn Formula 1, data can make all the difference. It’s what sets one team apart from the rest, as careful analysis of telemetry data helps to shave those all-important hundredths of seconds off lap times. If that precious data is stolen, or compromised, racing teams could not only lose their competitive edge but also damage their brand’s reputation.

    Continue Reading
  • In the world of IoT the need for HSMs hits closer to home

    By | August 10, 2016

    Hardware security modules (HSMs) were once the sole purview of large enterprises and governmental organizations. The devices were used to enable a higher degree of security when deploying cryptographic technology to physically secure encryption keys. Today’s HSMs provide a secure platform for managing cryptographic keys and their use over the life cycle of both cryptographic material and associated data. In other words, HSMs were specifically designed to make it maximally secure for an organization to use cryptography to obscure its data. Given today’s enhanced threat scape and the increased emphasis on security imposed by the connectedness of the internet, small and mid-sized businesses are beginning to adopt HSM technology as well.

    Continue Reading
  • Securely driving digital transformation

    By | August 02, 2016

    Laptops. Tablets. Smartphones. Thermostats. Fitness trackers. Insulin pumps. Cars. Welcome to connected (almost) everything. Increased connectivity means a lot more data. A lot more data means the need for data protection…and  trusted relationships between the providers of that data, the consumers of that data and the conduits for that data.

    Continue Reading
View more

About this blog

Welcome to our new merged blog site, featuring key management and payments security focused content previously hosted on www.keymanagementinsights.com and www.paymentssecurity.com.

As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

Thales has been applying data protection and key management expertise to the worldwide payments industry for over 25 years. Our solutions secure retail and corporate banking, integrate with all widely used credit/debit applications, and include the world's best-selling EMV data preparation system and complete PIN management for card issuers.