Key Management and Payments Security Blog - Thales e-Security

Data Security and Key Management - Thales e-Security

  • RSA Conference 2017: Highlights and Innovations

    By | February 15, 2017

    It goes without saying, really, but RSA Conference is the biggest cybersecurity convention of the year. From all across the world, private sector and government leaders come to San Francisco to inspect the latest innovations our industry has to offer.

    RSA Conference 2017 remains important, but I have seen a noticeable shift in the conversations our sector wishes to discuss. In the following blog post, I will examine the top four highlights and innovations I have seen so far this year.

    Continue Reading
  • It’s time for security provisions to catch up with software development

    By | February 15, 2017

    As Marc Andreessen once said, "software is eating the world".

    As technology becomes a differentiator in all market segments, we’ve seen an explosion in the development and use of software over the past decade. Driving this innovation is the ease of consumption afforded by the roll-out of high speed internet connections everywhere as well as the miniaturisation of devices that can consume digital services.

    Continue Reading
  • Quantum Resistance – Algorithm Flexibility Practicalities

    By | February 13, 2017

    In order to protect our data in the medium term the algorithms and protocols used must be resistant to developments in Quantum Computing that could result in many conventional public key algorithms becoming breakable – that is, reversible from the public key. One of the uses of public key cryptography is Key Agreement (also known as Key Exchange), which typically uses the Diffie-Hellman mechanism, and its Elliptic Curve equivalents.

    Replacement mechanisms have been proposed for Diffie-Hellman, notably New Hope, as an example. But how similar is it - and how easy will future algorithm developments fit into existing applications?

    Continue Reading
  • New Solutions and Vision for Google Cloud Platform & Microsoft Azure Key Management – RSA Conference 2017

    By | February 13, 2017

    Governments do ask cloud providers to hand over their customers’ data. Last week there was another reminder when a Federal Court said Google must turn over data in foreign servers. This reminder underlies one of the reasons it is important to not only encrypt your data in the cloud, but to assure that you are the custodian of the encryption keys. Thales is making two announcements about new cloud key management capabilities at the RSA Conference this week that will address this concern, as well as deliver other security advantages to security conscious organizations.

    Continue Reading
  • Global Data Threat Landscape – Biggest National Differences

    By | February 10, 2017

    Who is most and least vulnerableEspecially if you work in U.S. IT Security, it's often the case that people will think about the environment of attacks, threats, controls and defenses in a pretty insular manner - assuming that what's true in the U.S. is also true around the world. But it's time we lost that attitude - especially if you work in a global organization.

    Continue Reading
  • Delivering Trust for Blockchain and Distributed Ledgers

    By | February 08, 2017

    It’s no secret that blockchain was one of the most impactful technology stories of 2016. Offering game-changing benefits over legacy systems, blockchain promises fast, immutable transactions at much lower cost for settlement, clearing and payment applications.

    Blockchain gained much of its notoriety as the technological backbone of Bitcoin, which enables transactions to be made and verified on a network instantaneously without a central authority. While cryptocurrencies may have become less popular, the technology behind their use continues to gain significant traction.

    Continue Reading
  • Taking the steps towards a safer internet

    By | February 07, 2017

    Every day we are faced with scary statistics about our increasingly connected and digital world. Just recently, our Data Threat Report revealed that over two thirds of global organisations have experienced a data breach. Successful attacks on the likes of Yahoo and LinkedIn last year need not remind us of the consequences of falling victim to increasingly sophisticated hackers.

    But it’s not just global businesses facing the impending threat of hackers in today’s digital driven world – individuals are too. In the US, the number of identity fraud victims reached a record high last year, with some 15.4 million Americans falling victim to fraudsters. In the UK too, almost one in ten people experienced fraud during 2016, making online fraud the most common crime in the entire country.

    Continue Reading
  • RSA 2017 and our opportunities to lead

    By | February 06, 2017

    RSA Conference 2017 is about to begin, and could data security be any more relevant today? I know I could say that every year – indeed in the lead up to RSA Conference 2016, I wrote about people recognizing data breaches as part of their daily lives. But a lot can happen in a year. Data security is headline news every day, multiple times a day.

    This year Thales comes to the world’s largest security conference with two priorities in mind: (1) How do we secure emerging technologies; and (2) How can we both adapt to and help inform the federal cybersecurity policymaking that will undoubtedly impact our industry – and the world?

    Continue Reading
  • 2017's Most Surprising Data Threat Report Results

    By | February 02, 2017


    This is the second in our series on 2017 Data Threats - Read the initial post on "The Big Disconnect" here.

    In the just released 2017 Thales Data Threat Report - Global Edition developed by Thales with 451 Research, we had some surprising results in the data.  Some of these surprises were around new environments - our results around Containers was one of these - while others stressed just how much most enterprises HAVE NOT changed what they are doing, in spite of changes in the threat landscape that their organizations are encountering, and the continued increase in rates of data breaches that are one of the prime results.

    Continue Reading
  • New Innovations for the New Year, Part Two: The Long Term

    By | January 30, 2017

    As I discussed in my previous post, the security industry often feels dangerously reactive to innovation. Instead of looking forward to the future, we are constantly playing catch up and filling in gaps as they emerge. Short term resolutions will always tend to be more reactive as a whole, but we can use the tools we develop today to prognosticate the future of our industry.

    Ultimately, our sector needs to find a proper balance between anticipation and reaction. Today, most organizations ask the following questions when they think about the future:

    Continue Reading
View more

About this blog

Welcome to our new merged blog site, featuring key management and payments security focused content previously hosted on and

As companies look to protect their customer data and other sensitive information, encryption is being deployed more widely. Yet if an encryption key is lost then that data cannot be recovered. Avoiding this problem demands formalized processes and robust technologies for key management making the protection, management and secure use of cryptographic keys a fundamental component of modern IT security.

Thales has been applying data protection and key management expertise to the worldwide payments industry for over 25 years. Our solutions secure retail and corporate banking, integrate with all widely used credit/debit applications, and include the world's best-selling EMV data preparation system and complete PIN management for card issuers.

Powered by GlobalLink OneLink Software