Skip Navigation

News

May 24, 2021
Government Computer News
Despite recent unverified claims that DarkSide, the ransomware hacking operation responsible for the Colonial Pipeline attack, has dismantled its operations, the incident reinforces one important point for government IT managers: If data is not encrypted, bad actors will do it themselves, and agencies will end up paying for it.
May 17, 2021
Intelligence Community News
We want to think that we’ve made our IT systems relatively impervious to ransomware attacks, but trends are showing otherwise. Rather than focusing on only preventing breaches, we have to consider the importance of file encryption so data is worthless even if the network is compromised.
April 30, 2021
Government Computer News
If the ongoing reporting and scorecards for the Federal Information Technology Acquisition Reform Act have proved anything over the past several years, it’s that many agencies have had trouble quantifying sensitive data -- where in their infrastructure it is located, who can access it and how susceptible it may be to cyber threats.
April 28, 2021
Carahsoft Community
A supply chain attack aims to damage an organization by targeting less secure elements in its supply network. The initial victim becomes a steppingstone to infiltrate other networks. Exploiting a service provider’s data supply chain or traditional manufacturer supply chain has been the objective in many recent major data breaches.
April 19, 2021
Thales TCT
Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced that its Luna T-Series Hardware Security Modules (HSMs) have received Federal Information Processing Standards (FIPS) 140-2 Level 3 validation from the National Institution of Standards and Technology (NIST).
April 13, 2021
Intelligence Community News
Let’s take a look Zero Trust, and how a strategy based on its principles can help achieve security in a post-perimeter environment. In particular, we’ll address the NIST Special Publication on Zero Trust, and consider ways to implement an effective identity-centric Zero Trust architecture.
April 1, 2021
Thales TCT
Thales Trusted Cyber Technologies (TCT), a trusted, U.S. based source for cyber security solutions, today announced the appointment of Lloyd Mitchell as the company’s new President. Mr. Mitchell will focus on expanding the company’s portfolio of data security products, creating an innovative work environment, and establishing Thales TCT as a leader in the U.S. Federal market for providing high quality products and world class customer support.
March 8, 2021
Intelligence Community News
IT security has traditionally focused on perimeter defense – essentially building walls around the infrastructure to prevent network incursions. Unfortunately, that is just not enough for real security. If today’s Chief Information Security Officers (CISOs) and Chief Data Officers (CDOs) want to break the reactionary cycle of measures and counter measures, they must take a completely new approach: data-centric security
February 22, 2021
Government Computer News
What should an agency’s “information security program” include? With agencies’ increased emphasis on big data throughout their operations, if the program does not include a strategy for big data and cloud security, it is incomplete.
January 4, 2021
Government Computer News
The recent SolarWinds supply chain hack will go down as one of the most serious of 2020, but it’s likely to be just the beginning of more concerted efforts by bad actors to interfere with security in both the government and private sectors.

Thales TCT Locations

Headquarters:
3465 Box Hill Corporate Center Drive
Suite D
Abingdon, MD 21009
info@thalestct.com
443-484-7070
 
Glen Burnie Office:
504 McCormick Dr., Suites S&T
International Trade Center
Glen Burnie, MD 21061

 

Interested in Joining the Thales TCT Team?

Learn more about career opportunities at Thales TCT Careers

Connect with us

Learn more about our products, solutions and services Contact Thales TCT

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept