• Gemalto is now part of the Thales Group, find out more.
 

Gemalto joins the Thales group

Read more about the acquisition and our common vision for next generation digital security.

Find out more

The Digital Identity Revolution

From eID to Mobile ID

Read more

Definition & benefits of a 5G SIM for 5G virtualized networks

Understanding what a 5G SIM is and its benefits

Read more

Global IoT connectivity made easy

Delivering IoT connectivity in an evolving network landscape

Download the report

Enabling organizations to offer trusted digital services for billions of individuals and things.

FIND OUT WHAT WE CAN DO FOR YOU

  • Posted on Apr 15, 2019

    Understanding Key Management Policy – Part 2

    In the first part of this two-part series on Key Management, we saw how an increasing number of organizations are encrypting their sensitive data to mitigate cybersecurity risks. As covered earlier, with cybercriminals getting more sophisticated, merely encrypting data is not sufficient.

    Read this post

 Events