In this episode of the Thales Security Sessions podcast, host Steve Prentice speaks with Grainne McKeever of Thales about the growing threat of bad bots in the travel industry. Drawing on insigh...
AI is revolutionizing cybersecurity, but with rapid advancements come unprecedented risks. In The Hidden Battle for AI Security, three leading data security experts from Thales pull back the cur...
A cyberattack is a period of enormous stress for an organization. Most companies lack the experience and the expertise to handle such an event effectively, which can lead to further damage to as...
Software monetization isn’t just about selling more subscriptions—it’s about survival. In today’s fast-moving digital economy, companies that fail to capture, protect, and maximize the value of ...
Cybersecurity is at a crossroads, and so are the women in it. While progress is visible, the numbers tell a different story—women’s representation in cyber is stagnating, and in some cases, even...
What happens when a 10-year NFL veteran swaps the gridiron for the world of cybersecurity? In this episode, we sit down with John Fina, a former professional football player who’s made a remarka...
What does 2025 have in store for us? If it is anything like 2024, it will be interesting times indeed. In this episode, host Steve Prentice has a virtual fireside chat with David Holmes, CTO for...
Data sovereignty has three dimensions: data residency, access to data, and stewardship of data. Besides deciding where to store data, it is essential to determine who can have access to it - whi...
The quantum computing revolution is almost upon us, and this means a new world of cryptography, cybersecurity and, of course, cybercrime. Not all of us are aware of the magnitude of the change t...
Passkeys are a groundbreaking technology that leaves traditional passwords in the dust. They are designed to be resistant to phishing attacks thanks to their relationship to specific websites or...