Key Management and Payments Security Blog - Thales e-Security

Data Security and Key Management - Thales e-Security

  • Creaking PKIs poised for breakdown in today’s IT enterprise environments

    By | September 28, 2015

    Yet another complication in the ongoing move to the cloud has come to light, and it’s come in the form of a familiar technology – one that might be in need of that overhaul that many have been putting off for the last few years.  Love it or hate it, rely on it, or don’t trust it – whatever the case, your enterprise public key infrastructure (PKI) might be in desperate need of some loving care.

    Continue Reading
  • Mobile ticketing- convenient and loved by consumers but with ease of use, comes risk

    By | September 18, 2015

    The Rugby World Cup this week has grabbed the attention of fraudsters, who have potentially left thousands of avid rugby fans disappointed through their unofficial websites. Event organisers cannot shy away from consumer expectation for ‘in the pocket’ convenience of mobile ticket delivery and this event has been no different. But unfortunately, major ticketed events are fast becoming lucrative hunting grounds for would-be criminals and as e-tickets become increasingly commonplace, so does the risk of fraud. Without proper protections being applied behind the scenes, these digital passes are much easier to copy and fake than traditional printed tickets so how can we mitigate this risk, and ensure that tickets are valid and with their rightful holder?

    Continue Reading
  • There is a (security) castle on a cloud

    By | September 08, 2015

    At the end of last month, Google announced the debut of ‘Bring Your Own Encryption’ – the feature that will allow users to create and hold the encryption keys, preventing anyone accessing their at-rest data within the Google Cloud Platform.

    Continue Reading
  • Apps that go bump in the night

    By | August 11, 2015

    Businesses are facing a ‘double whammy’ threat – attackers are not only going after applications themselves, but the platforms on which those applications run. The OWASP Top 10 list is an ongoing reminder of many different types of application flaws, and every latest/greatest security tool purports to be that last missing link to shoring up the security of your server and mobile platforms.

    Continue Reading
  • Apple Pay: a continuous balancing act

    By | August 06, 2015

    On 14th July, Apple caused much excitement in the UK as it launched its mobile payments service, Apple Pay. From London Underground stations to coffee shops, nearly a quarter of a million outlets now offer Apple Pay, making it more widely available in the UK than when it first launched in the US in October last year. Its debut was exciting news for consumers, offering access to a slick and quick payment option with a brand they love, and carry around with them 24/7.

    Continue Reading
View more

About this blog

Welcome to our new merged blog site, featuring key management and payments security focused content previously hosted on and

As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

Thales has been applying data protection and key management expertise to the worldwide payments industry for over 25 years. Our solutions secure retail and corporate banking, integrate with all widely used credit/debit applications, and include the world's best-selling EMV data preparation system and complete PIN management for card issuers.