Contact Us
Social Media Banner

Newsroom

Not only are we the world leader in digital security, but we're also proud to be a thought leader and innovator in the security space. We hope you'll connect with us on social media, learn more about security trends and news on our blog, and follow our company as we work to make the digital world a safer place.

Gemalto Blog Icon

Gemalto Security Blog

Check out the Enterprise Security section of the Gemalto Digital Security blog for posts covering identity and data security news, trends, best practices, tips, and more.

Avoid missing out on our must-read security posts by bookmarking blog.gemalto.com/security/ and subscribing to the Gemalto blog on Feedly or your favorite news reader.

 

Technical Updates Blog Icon

Data Protection Technical Updates

Check this site often for information on new product releases, enhancements, patches, and more. Subscribe to our RSS feed or email service to make sure you don't miss any of the data protection updates for your product(s) of interest.

Visit the Data Protection Technical Updates site


CSO

Businesses admit poor data protection won’t be fixed before compliance perfect storm hits

July 12, 2017

 

ITP.net

Middle East businesses oblivious to real threats

July 12, 2017

 

Information Management

Despite rise in breaches, most organizations believe their data is safe

July 12, 2017

 

CRN

Gemalto Launches New Partner Program as Part of Revamped Channel Strategy

July 11, 2017

 

Computer Weekly

UK firms still relying on perimeter defences for cyber security

July 11, 2017

 

Infosecurity Magazine

IT Leaders Still Believe Perimeter Security Can Keep Hackers Out

July 11, 2017

 

Help Net Security

Businesses overconfident about keeping attackers at bay

July 11, 2017

 

Computer Business Review

‘Perimeter security is effective’ say 94% of IT decision makers

July 11, 2017

 

TEISS

Perimeter security over-reliance leaving businesses vulnerable

July 11, 2017

 

IP Pro

UK businesses lulled into false sense of cybersecurity, report reveals

July 11, 2017

 

Information Age

Are businesses over confident in their cyber security capabilities?

July 11, 2017

 

ITProPortal

Perimeter security ineffective and a waste of money, research shows

July 11, 2017

 

IT Security Guru

Frost & Sullivan Recognises Gemalto for Leadership in Encryption and Data Protection

July 6, 2017

 

Networks Asia

The proliferation of cyberattacks and data breaches: five practices organizations should put into action

July 6, 2017

 

Zawya

UAE firms need to meet EU data privacy law

July 5, 2017

 

Networks Asia

Do not succumb to Petya ransomware

June 30, 2017

 

EE Publishers

Consuming security – changing a mindset

June 29, 2017

 

The Financial Express

After Petya, Wannacry attacks, experts say India vulnerable to cyber attacks

June 28, 2017

 

ETCIO.com

Here’s what security vendors have to say about Petya ransomware attack

June 28, 2017

 

SME Channels

Gemalto simplifies access to Cloud Apps

June 19, 2017

 

Networks Asia

Gemalto launches access management and identity protection service

June 18, 2017

 

SC Magazine UK

Struggle is real: UK businesses unprepared for cyber-attack response

June 15, 2017

 

IoT Now

Survey reveals 32% of C-Suite have no response plan for cyberattacks or don’t know if they have one

June 15, 2017

 

CSO

Adopting cloud? You’ll need to update your identity infrastructure to do it securely

June 15, 2017

 

BGR

Gemalto unveils access management service to secure Cloud

June 13, 2017

 

ITP.net

Gemalto Boosts Security for Cloud Applications

June 13, 2017

 

VMBlog

Gemalto Simplifies and Secures Access to Cloud Applications with New Access Management Service

June 13, 2017

 

PCQuest

Gemalto Launches SafeNet Trusted Access

June 13, 2017

 

Digitalist Magazine

21 Facts on the Value Imperative to Embrace the Digital Economy

June 8, 2017

 

Hi-Tech Solutions Magazine

Data governance and the security industry

June 7, 2017

 

IT Pro

What to Expect from Infosecurity Europe  

6/5/2017

 

CloudTech

Why businesses must not assume GDPR compliance in the cloud  

6/2/2017

 

Gulfnews.com

Cat and mouse game will continue  

5/25/2017

 

Banking Technology

Gemalto bus-ts a move with GDPR double decker delight  

5/24/2017

 

MoneyControl

Zomato got lucky, you might not: Stolen data could make you  

5/23/2017

 

Information Age

6 steps to GDPR compliance  

5/23/2017

 

eSecurity Planet

DocuSign, Bell Canada Hacked  

5/17/2017

 

SC Magazine

Data of 1.9M Bell Canada customers compromised  

5/16/2017

 

Security Brief Asia

Interview: Gemalto's Rana Gupta talks secure breaches, encryption and cyber attacks  

5/15/2017

 

e-Security Planet

Encryption: Securing Sensitive Data in Changing Corporate Environments  

5/5/2017

 

Deccan Chronicle

Passwords: Are we still using them?  

5/3/2017

 

Network World

Data Breaches: It’s still personal  

5/01/2017

 

The Stack

Why encryption is a critical step towards GDPR compliance  

5/10/2017

 

Network World

Vendors approve of NIST password draft  

5/09/2017

 

Computerworld Australia

Securing customer loyalty, with data security  

4/28/2017

 

eSecurity Planet

Chipotle Hit by Credit Card Breach  

4/27/2017

 

Business Tech

South African companies will soon be forced to tell customers of a data breach by law  

4/23/2017

 

eSecurity Planet

Shoney's Restaurants, IHG Hotels Hit by Credit Card Breaches  

4/19/2017

 

Dark Reading

The Long Slog to Getting Encryption Right  

4/14/2017

 

CoinDesk

Blockchain for IoT: Promising, But Caution Needed  

4/13/2017

 

CNBC

Global investors lose billions to cyberattacks, report says  

4/12/2017

 

The Register

Cyberattacks wipe more than $50bn off big biz value, say bean counters  

4/12/2017

 

TEISS

The real cost of hacking on UK businesses? £42bn!  

4/12/2017

 

Australian Security Magazine

Combating the data protection challenges in Australia  

4/11/2017

 

City A.M.

Brexit and the spectre of cyber-attacks: Are you ready for Article 50 phishing?  

4/05/2017

 

IDG Connect Blog

Public vs. private blockchains: It could all prove a bit like the cloud  

4/03/2017

 

The Financial Express

36.6 million data records breached in India last year  

4/03/2017

 

Yahoo! India Finance

India witnessed close to 36.6 million data records theft: Gemalto  

4/02/2017

 

ComputerWeekly.com

Blockchain starts to prove its value outside of finance  

3/31/2017

 

eWeek

2016 Was a Record Year for Breaches, Gemalto Reports  

3/29/2017

 

CNBC Africa

Identity theft on the rise in South Africa  

3/29/2017

 

Credit Union Times

Data Breach Acceptance Replacing Breach Prevention?  

3/29/2017

 

The San Diego Union-Tribune

Are you like most Americans who don't know much about cybersecurity? Take the quiz  

3/29/2017

 

The Washington Times

Data breaches spiked by 86 percent in 2016; roughly 1.4 billion records compromised  

3/29/2017

 

Dark Reading

1.4 Billion Data Records Exposed in 2016 Breaches  

3/28/2017

 

SC Magazine UK

Gemalto Breach Level Index: 1.4bn data records compromised in 2016  

3/28/2017

 

Computer Business Review

Hackers steal nearly 4 million records every day  

3/28/2017

 

The Register

World+dog had 1.4 BEEEELLION of its data records exposed last year  

3/28/2017

 

Infosecurity Magazine

Led by AdultFriendFinder, Breached Records Spike 86%  

3/28/2017

 

ZDNet

Security? What security? Four million data records are stolen or lost every day  

3/28/2017

 

Help Net Security

1.37 billion data records compromised globally in 2016  

3/28/2017

 

SecurityBriefNZ

Gemalto's SafeNet KeySecure wins 2017 Cybersecurity Excellence Award  

3/27/2017

 

IDG Connect

Cinema chain hack sees data security take centre stage in South Africa  

3/23/2017

 

Enterprise Channels MEA

Gemalto’s HSM Provides Full Control of Encryption Keys to Customers  

3/22/2017

 

CIO

Gemalto's HSM Enables Microsoft Azure Information Protection Customers to Maintain Full Control of Encryption Keys  

3/21/2017

 

BBC News

How fake data could lead to failed crops and other woes  

3/20/2017

 

ZDNet

Google Cloud adds new customer-supplied encryption key partners  

3/15/2017

 

Dark Reading

Trust Begins With Layer 1 Encryption  

3/15/2017

 

Information Age

Encryption – everybody claims to be doing it, but what does it mean? Encryption – what does it mean?  

3/07/2017

 

SC Magazine

Sharing privacy and security smarts  

3/01/2017

 

Network World

NY State Cybersecurity Regulations: Who Wins?  

2/23/2017

 

IDG Connect

Does the CISO role need to be formalised?  

2/22/2017

 

Networks Asia

Gemalto unveils encryption solutions for cloud and on-premise environments  

2/21/2017

 

Infosecurity

Yahoo Could Cut $250m Off Sale Price - Reports  

2/16/2017

 

InfoRiskToday

The First Step in Protecting Business Data  

2/16/2017

 

Help Net Security

Yahoo notifies more users of malicious account activity  

2/16/2017

 

eWeek.com

Verizon Negotiates Down to $4.55B for Yahoo Transaction  

2/15/2017

 

SC Magazine

Always connected comes with risks  

2/15/2017

 

CRN

Partners Cheer New Blockchain Internet of Things Protocol Consortium  

1/31/2017

 

CoinDesk

Bosch, Cisco, Gemalto and More: Tech Giants Team for Blockchain-IoT  

1/27/2017

 

Computer Business Review

How to keep data safe on Data Protection Day: From cyber insurance and GDPR, to cloud and encryption  

1/27/2017

 

The National Law Review

U.S. data breaches reached record high in 2016: Report  

1/26/2017

 

CSO

Consumers lax on data security but unforgiving on businesses that are breached  

1/24/2017

 

McKinsey & Company

The EU data-protection regulation—compliance burden or foundation for digitization?  

1/22/2017

 

InfoSecurity Magazine

Consumers Hold Businesses, Not Themselves, Responsible for Data Breaches  

1/17/2017

 

Computerworld Singapore

How cloudy will APAC organisations be in 2017?  

1/08/2017

 

ComputerWeekly.com

Ransomware expected to dominate in 2017  

1/06/2017

 

BBC News

2017 tech trends: 'A major bank will fail'  

1/05/2017

 

CSO

Cybersecurity trends 2017: malicious machine learning, state-sponsored attacks, ransomware and malware  

1/02/2017

 

 


Black Hat USA 2017

Booth #1653

  • Conference
  • July 22 - July 27, 2017
  • Las Vegas, Nevada, United States
Book a meeting with us

Gartner Identity and Access Management Summit 2017

  • Conference
  • November 28 - November 30, 2017
  • Las Vegas, Nevada, United States
Book a meeting with us

RSA Conference 2018

  • Conference
  • April 16 - April 20, 2018
  • San Francisco, CA, United States
Book a meeting with us

SC Magazine awards 4.75 Star Rating to SafeNet Authentication Service (2014)

SC Magazine Finalist for Best Multifactor Solution, SafeNet Authentication Service (2015)

Laurie Usewicz, Vice President of Channel Sales, named a 2014 Channel Chief by The Channel Company’s CRN

SC Magazine Best Multi- and Second-Factor Solution Finalist: eToken (2010)

SC Magazine Best Multi- and Second-Factor Solution Finalist: eToken (2009)

Frost and Sullivan, Enabling Technology of the Year (2009)

SC Magazine 5-Star Rating: Sentinel Software Protection (2010)

SC Magazine Australia Product of the Year: DataSecure (2010)

Frost & Sullivan, Software Licensing and Management Product Line Innovation award: Sentinel Software Monetization Solutions portfolio (2011)

SIIA CODiE Award, Best DRM Solution: Sentinel Cloud (2012)

For media inquires please contact:

Chad Couser
Global
+1 443 327 1315

Anina Steele
EMEA and APAC
+44 1276 608 055

Michelle Leech
Americas
+1 512 605 2110


Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.