NHS Wales has responded to a surge in cyber-attacks against the healthcare sector by enlisting the services of some of the world¡¯s leading cyber security experts¡
April 2020 - if you were to drive on one of England¡¯s motorways today (and please don¡¯t, unless you are a key worker and have no choice) two things would strike you as odd¡
As a sovereign industry capability, for over 40 years, we have been designing, manufacturing and exporting world-leading sonar technology for the Royal Australian Navy and Allied Navies and for use on all major platforms including Huon, FFG, ANZAC and Collins Class S...
Climate change is now affecting every country on every continent. It is disrupting national economies and affecting lives, costing people, communities and countries dearly today and even more tomorrow¡
Our complete Mine Counter Measures & Military Survey (MMCMMS) package is designed to help cut through the complexity of un-crewed MMCMMS operations.
Its flexibility, coupled with Thales¡¯ domain expertise, enables us to clarify the precise needs of the customer and to ...
On April 28, 2006, the French-American satellite CALIPSO (Cloud Aerosol Lidar and Infrared Pathfinder Satellite Observations) was launched from Vandenberg Air Force Base in California. Built for the French and American space agencies, CNES and NASA, the satellite provi...
Explore the impact of the CFPB¡¯s new Personal Financial Data Rights rule and how it aims to empower consumers, drive competition, and reshape open banking in the U.S.
The Cybersecurity Maturity Model Certification (CMMC) is the DoD¡¯s latest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled¡
The world relies on Thales to protect and secure access to your most sensitive data and software wherever created, shared or stored. Building an encryption strategy, licensing software, providing¡
The Google NEXT 2025 event was a remarkable showcase of innovation, collaboration, and cutting-edge technology. Thales, a global leader in advanced cyber security technologies, played an engaging¡