Key Management and Payments Security Blog - Thales e-Security

Data Security and Key Management - Thales e-Security

  • Turn Cyber Monday into Safe Payment Monday

    By | November 25, 2015

    The National Retail Federation (NRF) reports that more people plan to shop on Cyber Monday than ever before. In its annual Preliminary Thanksgiving Weekend Survey, the NRF asked consumers specifically about their Cyber Monday shopping plans; almost 80 percent—an estimated 184 million unique shoppers—said they will or may shop that day. Predictive analytics firm Custora reports that last year, 26 percent of e-commerce sales came from mobile devices between Thanksgiving and Cyber Monday.  The expectations for this holiday season are even greater.

    Continue Reading
  • System effects on security and trust

    By | November 19, 2015

    Jon Geater talks about the importance of trust and security in the connected world.

    Continue Reading
  • HSMs now have extra sets of eyes

    By | November 18, 2015

    For many years, the management of hardware security modules (HSMs) fell primarily to security and risk management teams.  However, the world is changing rapidly and security has moved from a departmental responsibility to an enterprise responsibility.  Security is becoming a shared responsibility across business application, IT and security departments where different teams need to complement each other and work in parallel.

    Continue Reading
  • Data in motion or data in slow motion… that is the question

    By | November 17, 2015

    Shakespeare’s Hamlet posed the question "To be, or not to be…" in order to verbalize the struggle between two potential courses of action, each of which would have long-lasting impact. Today, IT professionals must struggle with the dilemmas posed by securing data in motion. In one course of action, a low-cost security solution can satisfy the lowest common denominator known to security… the stamp of certification. Banking on the 'feel good' that stamps of approval bring, these low-cost security solutions come with a heavy price tag in terms of potentially poor performance and lost bandwidth.

    Continue Reading
  • The evolution of EMV and mobile first security

    By | November 16, 2015

    This October saw the long-awaited EMV liability shift in the US, rendering merchants (whose terminals do not comply with the EMV standards) liable for fraudulent or counterfeit transactions when a customer presents a chip card for payment. With the doors on this global “EMV loophole” now effectively being closed, fraudsters will start to turn their attention elsewhere – card not present (CNP) transactions are likely to bear the brunt of this. Javelin estimates that CNP fraud will explode from $10 billion last year to $19 billion by 2018, when the vast majority of the US implementation will be complete.

    Continue Reading
View more

About this blog

Welcome to our new merged blog site, featuring key management and payments security focused content previously hosted on and

As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

Thales has been applying data protection and key management expertise to the worldwide payments industry for over 25 years. Our solutions secure retail and corporate banking, integrate with all widely used credit/debit applications, and include the world's best-selling EMV data preparation system and complete PIN management for card issuers.