Key Management and Payments Security Blog - Thales e-Security

Data Security and Key Management - Thales e-Security

  • Digital trust - a fundamental requirement for digital payments

    By | October 20, 2016
    Once, commerce was driven by the exchange of goods (barter), or by money that “clinked.” Then came paper money, letters of credit, checks, central banks, credit cards, ATMs, interbank transfers and online banking. Now the payments industry is well into yet another major transition: the rise of digital payments. In fact, according to Visa’s 2016 Digital Payments Study, global consumer adoption of mobile payments has tripled in the past year; with Turkey, Denmark and Norway noted as the top three markets for mobile payment users. The volume of transactions from apps that enable digital payments is also projected to grow at 10% this year (Capgemini), coming at three times faster than estimated global growth rates of around 3.4%. And Worldpay’s latest report predicted that eWallets will overtake credit cards as the most popular form of payment by 2019.

    Continue Reading
  • Are your PKI practices putting your business at risk?

    By | October 18, 2016

    Every day, our digital world is becoming more and more dependent on public key infrastructure (PKI). The need to create unique credentials that validate the identity of any person, device or service has never been more important. With the ever-present threat of cyberattacks, malicious insiders, or even employee mistakes, the role of digital credentials to control how sensitive data is accessed within an organization has reached new levels of criticality.

    Continue Reading
  • Are today's PKIs prepared to manage tomorrow's IoT device authentication demands?

    By | October 13, 2016

    We live in a world where the methods used to prove one’s identity can take many different forms – as simple (and weak) as a password, as complex as a biometric, or simply showing your driver’s license.  When it comes to proving the identity of a device that a human is using or is responsible for, the means that are available for authentication depend on the capabilities of the device.  And we’re quickly entering an era where the number and types of devices that are online and connected reaches a scale that stands to push authentication infrastructures as we know them today well past their limits.


    Continue Reading
  • October brings cybersecurity month

    By | October 12, 2016

    As you may or may not know, the month of October brings with it not just an autumnal change in leaf colour, but the start of European Cyber Security Month (ECSM). The ECSM is an EU advocacy campaign that promotes cyber security and advocates for change in the perception of cyber-threats by promoting data and information security, education and the sharing of good practices.

    Continue Reading
  • My cybersecurity "Ah-ha" moment

    By | October 06, 2016

    As some of you may be aware, October is National Cybersecurity Awareness Month.  The theme for this week, specifically, is STOP. THINK. CONNECT: The Basic Steps to Online Safety and Security. Part of this week’s focus includes examining “cybersecurity jobs and how to engage young people in pursuing careers devoted to protecting the Internet.”

    Continue Reading
View more

About this blog

Welcome to our new merged blog site, featuring key management and payments security focused content previously hosted on and

As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

Thales has been applying data protection and key management expertise to the worldwide payments industry for over 25 years. Our solutions secure retail and corporate banking, integrate with all widely used credit/debit applications, and include the world's best-selling EMV data preparation system and complete PIN management for card issuers.