Key Management and Payments Security Blog - Thales e-Security

Data Security and Key Management - Thales e-Security

  • Batch Data Transformation: Simple Deployment and Flexible Capabilities

    By | January 24, 2017

    Simply put: encryption is the most effective way for security professionals to protect their data. But, once you decide to encrypt, the question stops becoming “why” and becomes “how.” There are many different use cases in which sensitive data can reside, and thus there are seemingly endless ways to protect your data. These techniques include: full disk encryption, database encryption, file-level encryption, tokenization, dynamic data masking, and static data masking. And this is just naming a few.

    Confused? Don’t worry, all of these choices can be overwhelming. If you are just getting started with your encryption program, I recommend reading Cracking the Confusion: Encryption and Tokenization for Data Centers, Servers, and Applications, by leading security analyst firm, Securosis. If you’re looking for a summary, please check out our Selecting the Right Encryption Approach web page.

    Continue Reading
  • Fuel your digital eIDAS transformation

    By | January 23, 2017

    Eidas blog imgIn July last year EU Regulation N. 910/2014, also known as eIDAS, came into force – designed to harmonize national regulations around electronic signatures and digital identity and ensure the legal and technological interoperability of electronic identification systems. Its enforcement will drive the domestic market towards the digitization of document-based processes, and will therefore increase the use of electronic signature systems, long-term signature and document preservation systems, and strong authentication mechanisms, all of which will, ultimately, lead to an increase in the circulation of digital documents recognised as legally valid across Europe.

    Continue Reading
  • Vormetric Live Data Transformation – Boldly Going Where No Encryption Has Gone Before

    By | January 17, 2017

    Downtime. Nobody likes it. Unplanned downtime is almost always expensive. A 2015 report from IDC also revealed that for the Fortune 1000, the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year.

    Planned downtime is also a pain. Before I was in the security business, I marketed network solutions that were “bumps on the wire” that required planned downtime for deployment. There were ways to minimize or even reduce the downtime, but they were complicated.

    Continue Reading
  • eIDAS – breaking the grip from ink and paper

    By | January 18, 2017

    Much has already been written on eIDAS, the new EU regulation on electronic identification and trust services; that it holds the promise of a safer and more integrated digital Europe, for example, or that it will make our everyday lives easier – whether opening a bank account or enrolling in a foreign university.

    However a task such as opening a bank account in the EU country of which you are a national – let alone one in a neighbouring country – can be surrounded by so much complexity and time, and so many processes (both paper-based and analog) that it becomes more of an esoteric ritual.

    Continue Reading
  • Identity in the Time of Digitalization

    By | January 16, 2017

    Electronic Signature and Multifactor Authentication

    We are entering a new digital world in which the way we perceive and protect identity is rapidly shifting. As a result , the risk of identity theft is increasing. So how can today’s technology meet challenges such as these?

    Continue Reading
  • New Innovations for the New Year, Part One: The Short Term

    By | January 13, 2017

    This may sound obvious, but our industry is very reactive. It often feels like we, as security professionals, must wait in the wings until something disastrous happens. Then, and only then, are we allowed to develop and respond to technologic trends.

    So why does security consistently feel like it’s behind the curve? There are multiple reasons. We are all familiar with the dichotomy of security vs. convenience, which often positions security as the polar opposite of innovation. Many start-ups encourage a culture that values business swiftness over long term stability, and security is typically seen as too cumbersome. However, it’s possible for us to be excited about market trends and information security, we just need to begin taking the correct steps.

    Continue Reading
  • How governments around the globe are tackling cyber-security

    By | January 09, 2017
    Every country has secrets. Every government has data or information that it simply cannot afford to lose or have stolen. Whether it’s strategic military positioning, government-owned ‘Big Data’ or even citizen ID or voter data governments have long had a need for High Assurance computer systems protection and cyber intelligence defences.
    Continue Reading
  • CSO new year resolutions for 2017 - make security a priority in digital transformation

    By | January 03, 2017

    In 2016, we saw organizations increasingly investing in a digital transformation strategy and any CIO worth their salt is going to continue to drive that change through 2017. In fact, Gartner’s 2017 CIO agenda survey found that more money is being invested into technologies that support shifts to digital services than in the past. At the same time, the board is increasing the pressure on CIOs to move the organization forward technologically in order to better compete in this ever-increasing digital world.

    Continue Reading
  • Docker data security - going from zero to hero

    By | December 28, 2016

    If you are already developing on Docker, you already know why interest is so high.  The combination of faster application delivery and evolution that it makes possible, easily scalable microservices, reusable standard images, and the possibility of reducing system licensing and management costs is nearly irresistible if you’ve adopted a DevOps strategy.  And a compelling reason to adopt one if you are not.

    For a look at just how hot Docker is, take a look at the Google trends search I captured in November comparing searches on Docker, Virtualization, DevOps and Big Data since the introduction of Docker in March of 2013.  It’s a telling story, with Docker searches far exceeding even combined searches around virtualization and DevOps from late 2014 on.

    Continue Reading
  • How Thales gets you home safe in time for Christmas

    By | December 22, 2016

    The singer Chris Rea enjoyed a seasonal hit in 1988 with “Driving home for Christmas”; but his hit album the following year, “The Road to Hell”, perhaps painted a more accurate picture of travel at Christmas.

    Fortunately, 50 years of advances in transport operations and information technology have transformed the experiences of millions of passengers and Thales UK, through its wide-ranging products and services, has made great advances towards reducing crowded trains, congested roads and unreliable services. 

    Continue Reading
View more

About this blog

Welcome to our new merged blog site, featuring key management and payments security focused content previously hosted on www.keymanagementinsights.com and www.paymentssecurity.com.

As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

Thales has been applying data protection and key management expertise to the worldwide payments industry for over 25 years. Our solutions secure retail and corporate banking, integrate with all widely used credit/debit applications, and include the world's best-selling EMV data preparation system and complete PIN management for card issuers.