Kontakt
Social Media Banner

Newsroom

Not only are we the world leader in digital security, but we're also proud to be a thought leader and innovator in the security space. We hope you'll connect with us on social media, learn more about security trends and news on our blog, and follow our company as we work to make the digital world a safer place.

Gemalto Blog Icon

Gemalto Security Blog

Check out the Enterprise Security section of the Gemalto Digital Security blog for posts covering identity and data security news, trends, best practices, tips, and more.

Avoid missing out on our must-read security posts by bookmarking blog.gemalto.com/security/ and subscribing to the Gemalto blog on Feedly or your favorite news reader.

 

Technical Updates Blog Icon

Data Protection Technical Updates

Check this site often for information on new product releases, enhancements, patches, and more. Subscribe to our RSS feed or email service to make sure you don't miss any of the data protection updates for your product(s) of interest.

Visit the Data Protection Technical Updates site


Cnet

Smart tea kettle leaves your home Wi-Fi security in hot water

September 7, 2017

 

CSO

Protecting data: when confidence is overconfidence

September 7, 2017

 

TechTarget

IoT: Another opportunity to build in security from the start

September 7, 2017

 

IDG Connect

Could blockchain unlock the potential in IoT?

September 4, 2017

 

Computer Business Review

VMware Cloud on AWS goes live, bolsters hybrid cloud security

August 29, 2017

 

CSO

Australia is filled with EU citizens; will you meet your GDPR obligations to them?

August 22, 2017

 

Cybersecurity Insiders

6 steps to prepare for post Brexit GDPR compliance

August 22, 2017

 

Global Banking & Finance Review

Blockchain: It’s Not All about the Money, Money, Money

August 19, 2017

 

Computerworld Mexico

Password, insuficiente contra las brechas de seguridad en las empresas

August 10, 2017

 

Les Echos

Il est temps de repenser le scénario de la sécurité des données

August 10, 2017

 

IoT Now

Organisations must control access and manage identities to secure IoT

August 10, 2017

 

InfoChannel

Gemalto trabaja con quien quiera prepararse

August 9, 2017

 

ITP.net

Gemalto's Sebastien Pavie on perimeter security

August 7, 2017

 

Startups

GDPR to become law regardless of Brexit, as UK data regulation gets overhauled

August 7, 2017

 

CSO

More confident in their security than overseas peers, Australian IT execs aren’t increasing budgets by as much

August 2, 2017

 

E-Security Planet

HBO Hack Highlights Importance of Encryption, Data Governance

August 2, 2017

 

SC Magazine UK

Is China's newly built quantum crypto-network really unhackable?

July 28, 2017

 

BBC

How Bitcoin is infiltrating the $60bn global art market

July 25, 2017

 

eSecurity Planet

Massive Breach of Swedish Citizens' Data Points to Desperate Need for Risk Management

July 25, 2017

 

Telecompaper

Mocana teams up with Gemalto to secure IoT

July 24, 2017

 

Channelnomics US

Gemalto partner program overhaul aims to ramp up U.S. channel

July 21, 2017

 

CSO

In 2017, the pressure is on to be secure. Are you feeling the squeeze?

July 21, 2017

 

Channelnomics EU

Gemalto puts 'huge emphasis' on training in new partner programme launch

July 20, 2017

 

MoneyControl

No passwords please: The need of a strong authentication protocol in the digital age

July 20, 2107

 

IT Pro

GDPR news: Cloud Industry Forum wants to help vendors comply with GDPR

July 20, 2017

 

Siliconrepublic.com

Wanted: IT security superheroes to fight cybercrime

July 19, 2017

 

Healthcare Asia Magazine

Healthcare CEOs gears up against cybersecurity threats

July 19, 2017

 

SC Magazine

Multiple vulnerabilities found in connected IoT home security device

July 17, 2017

 

Zawya

Mideast businesses overly confident about keeping hackers at bay

July 16, 2017

 

Australasian Lawyer

6 steps to GDPR and MDB compliance

July 16, 2017

 

eWeek

Enterprises Overconfident About Perimeter Security, Gemalto Finds

July 14, 2017

 

SC Magazine UK

Research: businesses over confident about ability to fend off hackers

July 13, 2017

 

IT News Africa

Companies Still Under Investing In Data Security- Report

July 13, 2017

 

Deccan Chronicle

‘Perimeter security is the focus, but understanding of data security is lacking’

July 13, 2017

 

CSO

Businesses admit poor data protection won’t be fixed before compliance perfect storm hits

July 12, 2017

 

ITP.net

Middle East businesses oblivious to real threats  

July 12, 2017

 

Information Management

Despite rise in breaches, most organizations believe their data is safe  

July 12, 2017

 

CRN

Gemalto Launches New Partner Program as Part of Revamped Channel Strategy  

July 11, 2017

 

Computer Weekly

UK firms still relying on perimeter defences for cyber security  

July 11, 2017

 

Infosecurity Magazine

IT Leaders Still Believe Perimeter Security Can Keep Hackers Out  

July 11, 2017

 

Help Net Security

Businesses overconfident about keeping attackers at bay  

July 11, 2017

 

Computer Business Review

‘Perimeter security is effective’ say 94% of IT decision makers  

July 11, 2017

 

TEISS

Perimeter security over-reliance leaving businesses vulnerable  

July 11, 2017

 

IP Pro

UK businesses lulled into false sense of cybersecurity, report reveals  

July 11, 2017

 

Information Age

Are businesses over confident in their cyber security capabilities?  

July 11, 2017

 

ITProPortal

Perimeter security ineffective and a waste of money, research shows  

July 11, 2017

 

IT Security Guru

Frost & Sullivan Recognises Gemalto for Leadership in Encryption and Data Protection  

July 6, 2017

 

Networks Asia

The proliferation of cyberattacks and data breaches: five practices organizations should put into action  

July 6, 2017

 

Zawya

UAE firms need to meet EU data privacy law  

July 5, 2017

 

Networks Asia

Do not succumb to Petya ransomware  

June 30, 2017

 

EE Publishers

Consuming security – changing a mindset  

June 29, 2017

 

The Financial Express

After Petya, Wannacry attacks, experts say India vulnerable to cyber attacks  

June 28, 2017

 

ETCIO.com

Here’s what security vendors have to say about Petya ransomware attack  

June 28, 2017

 

SME Channels

Gemalto simplifies access to Cloud Apps  

June 19, 2017

 

Networks Asia

Gemalto launches access management and identity protection service  

June 18, 2017

 

SC Magazine UK

Struggle is real: UK businesses unprepared for cyber-attack response  

June 15, 2017

 

IoT Now

Survey reveals 32% of C-Suite have no response plan for cyberattacks or don’t know if they have one  

June 15, 2017

 

CSO

Adopting cloud? You’ll need to update your identity infrastructure to do it securely  

June 15, 2017

 

BGR

Gemalto unveils access management service to secure Cloud  

June 13, 2017

 

ITP.net

Gemalto Boosts Security for Cloud Applications  

June 13, 2017

 

VMBlog

Gemalto Simplifies and Secures Access to Cloud Applications with New Access Management Service  

June 13, 2017

 

PCQuest

Gemalto Launches SafeNet Trusted Access  

June 13, 2017

 

Digitalist Magazine

21 Facts on the Value Imperative to Embrace the Digital Economy  

June 8, 2017

 

Hi-Tech Solutions Magazine

Data governance and the security industry  

June 7, 2017

 

IT Pro

What to Expect from Infosecurity Europe  

6/5/2017

 

CloudTech

Why businesses must not assume GDPR compliance in the cloud  

6/2/2017

 

Gulfnews.com

Cat and mouse game will continue  

5/25/2017

 

Banking Technology

Gemalto bus-ts a move with GDPR double decker delight  

5/24/2017

 

MoneyControl

Zomato got lucky, you might not: Stolen data could make you  

5/23/2017

 

Information Age

6 steps to GDPR compliance  

5/23/2017

 

eSecurity Planet

DocuSign, Bell Canada Hacked  

5/17/2017

 

SC Magazine

Data of 1.9M Bell Canada customers compromised  

5/16/2017

 

Security Brief Asia

Interview: Gemalto's Rana Gupta talks secure breaches, encryption and cyber attacks  

5/15/2017

 

e-Security Planet

Encryption: Securing Sensitive Data in Changing Corporate Environments  

5/5/2017

 

Deccan Chronicle

Passwords: Are we still using them?  

5/3/2017

 

Network World

Data Breaches: It’s still personal  

5/01/2017

 

The Stack

Why encryption is a critical step towards GDPR compliance  

5/10/2017

 

Network World

Vendors approve of NIST password draft  

5/09/2017

 

Computerworld Australia

Securing customer loyalty, with data security  

4/28/2017

 

eSecurity Planet

Chipotle Hit by Credit Card Breach  

4/27/2017

 

Business Tech

South African companies will soon be forced to tell customers of a data breach by law  

4/23/2017

 

eSecurity Planet

Shoney's Restaurants, IHG Hotels Hit by Credit Card Breaches  

4/19/2017

 

Dark Reading

The Long Slog to Getting Encryption Right  

4/14/2017

 

CoinDesk

Blockchain for IoT: Promising, But Caution Needed  

4/13/2017

 

CNBC

Global investors lose billions to cyberattacks, report says  

4/12/2017

 

The Register

Cyberattacks wipe more than $50bn off big biz value, say bean counters  

4/12/2017

 

TEISS

The real cost of hacking on UK businesses? £42bn!  

4/12/2017

 

Australian Security Magazine

Combating the data protection challenges in Australia  

4/11/2017

 

City A.M.

Brexit and the spectre of cyber-attacks: Are you ready for Article 50 phishing?  

4/05/2017

 

IDG Connect Blog

Public vs. private blockchains: It could all prove a bit like the cloud  

4/03/2017

 

The Financial Express

36.6 million data records breached in India last year  

4/03/2017

 

Yahoo! India Finance

India witnessed close to 36.6 million data records theft: Gemalto  

4/02/2017

 

ComputerWeekly.com

Blockchain starts to prove its value outside of finance  

3/31/2017

 

eWeek

2016 Was a Record Year for Breaches, Gemalto Reports  

3/29/2017

 

CNBC Africa

Identity theft on the rise in South Africa  

3/29/2017

 

Credit Union Times

Data Breach Acceptance Replacing Breach Prevention?  

3/29/2017

 

The San Diego Union-Tribune

Are you like most Americans who don't know much about cybersecurity? Take the quiz  

3/29/2017

 

The Washington Times

Data breaches spiked by 86 percent in 2016; roughly 1.4 billion records compromised  

3/29/2017

 

Dark Reading

1.4 Billion Data Records Exposed in 2016 Breaches  

3/28/2017

 

SC Magazine UK

Gemalto Breach Level Index: 1.4bn data records compromised in 2016  

3/28/2017

 

Computer Business Review

Hackers steal nearly 4 million records every day  

3/28/2017

 

The Register

World+dog had 1.4 BEEEELLION of its data records exposed last year  

3/28/2017

 

Infosecurity Magazine

Led by AdultFriendFinder, Breached Records Spike 86%  

3/28/2017

 

ZDNet

Security? What security? Four million data records are stolen or lost every day  

3/28/2017

 

Help Net Security

1.37 billion data records compromised globally in 2016  

3/28/2017

 

SecurityBriefNZ

Gemalto's SafeNet KeySecure wins 2017 Cybersecurity Excellence Award  

3/27/2017

 

IDG Connect

Cinema chain hack sees data security take centre stage in South Africa  

3/23/2017

 

Enterprise Channels MEA

Gemalto’s HSM Provides Full Control of Encryption Keys to Customers  

3/22/2017

 

CIO

Gemalto's HSM Enables Microsoft Azure Information Protection Customers to Maintain Full Control of Encryption Keys  

3/21/2017

 

BBC News

How fake data could lead to failed crops and other woes  

3/20/2017

 

ZDNet

Google Cloud adds new customer-supplied encryption key partners  

3/15/2017

 

Dark Reading

Trust Begins With Layer 1 Encryption  

3/15/2017

 

Information Age

Encryption – everybody claims to be doing it, but what does it mean? Encryption – what does it mean?  

3/07/2017

 

SC Magazine

Sharing privacy and security smarts  

3/01/2017

 

Network World

NY State Cybersecurity Regulations: Who Wins?  

2/23/2017

 

IDG Connect

Does the CISO role need to be formalised?  

2/22/2017

 

Networks Asia

Gemalto unveils encryption solutions for cloud and on-premise environments  

2/21/2017

 

Infosecurity

Yahoo Could Cut $250m Off Sale Price - Reports  

2/16/2017

 

InfoRiskToday

The First Step in Protecting Business Data  

2/16/2017

 

Help Net Security

Yahoo notifies more users of malicious account activity  

2/16/2017

 

eWeek.com

Verizon Negotiates Down to $4.55B for Yahoo Transaction  

2/15/2017

 

SC Magazine

Always connected comes with risks  

2/15/2017

 

CRN

Partners Cheer New Blockchain Internet of Things Protocol Consortium  

1/31/2017

 

CoinDesk

Bosch, Cisco, Gemalto and More: Tech Giants Team for Blockchain-IoT  

1/27/2017

 

Computer Business Review

How to keep data safe on Data Protection Day: From cyber insurance and GDPR, to cloud and encryption  

1/27/2017

 

The National Law Review

U.S. data breaches reached record high in 2016: Report  

1/26/2017

 

CSO

Consumers lax on data security but unforgiving on businesses that are breached  

1/24/2017

 

McKinsey & Company

The EU data-protection regulation—compliance burden or foundation for digitization?  

1/22/2017

 

InfoSecurity Magazine

Consumers Hold Businesses, Not Themselves, Responsible for Data Breaches  

1/17/2017

 

Computerworld Singapore

How cloudy will APAC organisations be in 2017?  

1/08/2017

 

ComputerWeekly.com

Ransomware expected to dominate in 2017  

1/06/2017

 

BBC News

2017 tech trends: 'A major bank will fail'  

1/05/2017

 

CSO

Cybersecurity trends 2017: malicious machine learning, state-sponsored attacks, ransomware and malware  

1/02/2017


Gartner Identity and Access Management Summit 2017

  • Conference
  • November 28 - November 30, 2017
  • Las Vegas, Nevada, United States
Book a meeting with us

RSA Conference 2018

  • Conference
  • April 16 - April 20, 2018
  • San Francisco, CA, United States
Book a meeting with us

SC Magazine awards 4.75 Star Rating to SafeNet Authentication Service (2014)

SC Magazine Finalist for Best Multifactor Solution, SafeNet Authentication Service (2015)

Laurie Usewicz, Vice President of Channel Sales, named a 2014 Channel Chief by The Channel Company’s CRN

SC Magazine Best Multi- and Second-Factor Solution Finalist: eToken (2010)

SC Magazine Best Multi- and Second-Factor Solution Finalist: eToken (2009)

Frost and Sullivan, Enabling Technology of the Year (2009)

SC Magazine 5-Star Rating: Sentinel Software Protection (2010)

SC Magazine Australia Product of the Year: DataSecure (2010)

Frost & Sullivan, Software Licensing and Management Product Line Innovation award: Sentinel Software Monetization Solutions portfolio (2011)

SIIA CODiE Award, Best DRM Solution: Sentinel Cloud (2012)

For media inquires please contact:

Chad Couser
Global
+1 443 327 1315

Anina Steele
EMEA and APAC
+44 1276 608 055

Michelle Leech
Americas
+1 512 605 2110


Informationen anfordern

 

Vielen Dank für Ihr Interesse an unseren Lösungen. Bitte füllen Sie das Formular aus, um weitere Informationen zu erhalten oder um von einem SafeNet Mitarbeiter kontaktiert zu werden.

 

Ihre Angaben

* E-Mail-Adresse:  
* Vorname:  
* Nachname:  
* Unternehmen:  
* Telefon:  
* Land:  
* State (US Only):  
* Province (Canada/Australia Only):  
* Stadt:  
Bemerkungen:  
 

 Mit dem Ausfüllen dieses Formulars willige ich ein, im Rahmen der beschriebenen Datenschutzbestimmungen Informationen von Gemalto und seinen Tochtergesellschaften zu erhalten.