How can companies balance security and online experience?
Thales blog
by Haider Iqbal
6d ago
What’s more important to users today, data security or a good user experience? The answer…both. Security and experience now go hand in hand, and customers will simply go elsewhere if brands fall short on either. In fact, new global research from Thales’ Digital Trust Index found that 29% of consumers have abandoned a brand in the past 12 months because it demanded too much personal information. 27% have also abandoned a brand due to poor online support. It’s this combination of security and experience that ultimately fosters trust in a company. But how can brands strike that balance, and g ..read more
Visit website
World Border Security Congress: How can technology make travel safe, secure and streamlined?
Thales blog
by Françoise Bergasse
1w ago
Border control agencies and government authorities have vast remits; overseeing national security, facilitating cargo and trade, and managing the movement of millions of people across borders. With that comes various challenges. They must tackle the risk of illegal immigration, identity fraud, human trafficking, movement of contraband, and terrorist activity. With IATA predicting that in 2024 there will be 4.7 billion air travellers, how can technology help make travel safe, secure and streamlined? That’s where border management comes in. Border management is undergoing a significant evolu ..read more
Visit website
Trends, challenges, and opportunities in IoT deployment
Thales blog
by Rémi de Fouchier
1w ago
IoT deployment demands greater simplification, more orchestration, and the right level of security for each use case. With a projection of over five billion cellular IoT connections expected by 2028, the world of IoT is growing at a rapid pace. But what are the core trends, challenges and opportunities that lie ahead? In this article for Beecham Research, Remi de Fouchier, our vice president of strategy, marketing and innovation, recently sat down with Robin Duke-Woolley, the chief executive of Beecham Research, to share his response to the latest trends in IoT and how we’re helping organisat ..read more
Visit website
Five steps to secure eResidence Permits
Thales blog
by Terhi Halminen
3w ago
What are EU eRPs? An eResidence Permit (eRP) is a crucial document that allows foreign nationals to stay in the European Union (EU) beyond the initial three months. It serves as a legal proof of residence and provides essential information about the holder’s status. In light of recent incidents involving high-quality eRP counterfeits, there are some concerns around the existing eRP design in terms of security. In this blog, we share recommendations for document issuers on how to enhance eRP security and keep people’s identities safe… Techniques used by fraudsters While Electronic Residen ..read more
Visit website
Emerging digital identity trends for 2024
Thales blog
by John Cullen
1M ago
Whether we actively think about it or not, we are constantly verifying our identity as part of our everyday lives. Monitoring digital identity trends is therefore more important than ever. From showing our passports at border control, to buying alcohol and even unlocking our phones, proving our identity is a central part of countless daily interactions. As technology develops, our identities are increasingly being digitized. As we settle into 2024 we’ve started to see some new trends emerging. In this article for Intelligent CISO, John Cullen, Strategic Marketing Director Digital Identity at ..read more
Visit website
The deep fake threat: How do banks respond?
Thales blog
by Thales DIS
1M ago
Misinformation and fake news are on the rise – so prevalent that the World Economic Forum identified it as the biggest threat in its 2024 Global Risks Report. The threat posed by misinformation has been growing for several years now, but this is only compounded by the growing sophistication of deep fake technology. Artificial intelligence has made it easier for bad actors to generate convincing content designed to trick and catch us off guard. The very real consequences of how much damage deep fake content can do was recently brought into sharp focus when a finance worker of a big multination ..read more
Visit website
Thoughts and trends at MWC: eSIMs, IoT and post-quantum
Thales blog
by Yecaneh Aguado
1M ago
At huge events like Mobile World Congress (MWC), it’s common to feel overwhelmed by information. We attend sessions, meet new people, and take in fresh insights. But then, by the time we get back home, it’s become too much to process. The temptation can be to simply revert back to our everyday routines and ways of thinking – but fear not! We’ve distilled some of our biggest announcements and learnings from the event down into three key themes that will shape the year ahead… eSIM as a business enabler Consumers are embracing connected devices of all kinds, and one of the biggest talking points ..read more
Visit website
Securing eGovernment services with Post-Quantum Cryptography
Thales blog
by Thales DIS
1M ago
Post-Quantum Cryptography (PQC) is a new technology designed to defeat brute force attacks performed using quantum computers, which have the potential to break many of the commonly used cryptographic algorithms today. As quantum computing technology advances, traditional cryptographic systems, such as RSA and Elliptic Curve Cryptography (ECC), will become vulnerable to attacks due to their reliance on mathematical problems that quantum computers can solve efficiently. In the context of eGovernment services, PQC will play a crucial role in ensuring the security and integrity of sensitive data ..read more
Visit website
Adapting to thrive in a new era of connectivity management: Strategies for IoT enterprises
Thales blog
by Yecaneh Aguado
1M ago
In the lead up to MWC, we shared various articles on the explosion of connected devices, and how this necessitates a shift in how we manage connectivity. The verdict is clear: we can no longer manage connectivity as we did before. The landscape has changed, and so must our strategies. So, how do IoT enterprises adapt to thrive in this new era? What is the key to creating secure solutions for a connected world? When it comes to IoT deployments, we’ve identified three critical stages…. Stage One: Build The build phase marks the inception of an IoT project, and it encompasses initial device desi ..read more
Visit website
What are virtual cards and why do we need them?
Thales blog
by Kizzie Bowman
2M ago
A virtual card is an instantly created digital payment card connected to an end user’s bank account. It’s stored within an Issuer’s mobile application and works exactly like a physical card for payments both in-store and online. Virtual cards can have their own exclusive PAN number, expiry date and CVC, and they can be issued at the point of account opening for immediate use. They can either be for single usage – e.g. a disposable card that is activated for a limited time only or limited number of transactions, or for unlimited usage – e.g. an indefinite number of payments. Individual cards c ..read more
Visit website

Follow Thales blog on FeedSpot

Continue with Google
Continue with Apple
OR