The recovery ship of the Intermediate eXperimental Vehicle (IXV) leaves Genoa for rendez vous in the Pacific with IXV reentry demonstrator in November. IXV was built by Thales Alenia Space on behalf of ESA.
Imagine the glass of a flying control tower so strong that it could withstand a strike equivalent to a direct hit from the blade of Chinook helicopter... Welcome on board HMS Queen Elizabeth.
Thales announces the signing of a contract as well as the achievement of an important milestone with the Afghan Civil Aviation Authority (ACAA), as part of their efforts to secure the airspace of Afghanistan.
Navratna Defence Public Sector Undertaking Bharat Electronics Limited (BEL) and Thales announce that the Ministry of Corporate Affairs, Government of India, has approved the incorporation of their joint venture company, BEL-THALES Systems Limited, in lat...
Thales has been awarded a Foreign Military Sales (FMS) contract by the U.S. Air Force (USAF) to provide the Saudi Arabia National Guard with navigation aids (navaids) and air traffic control tower equipment.
A team from London Underground and Thales has won the Outstanding Teamwork Award at the National Rail Awards for their work on the modernisation of the Northern Line.
IXV (Intermediate eXperimental Vehicle), the European Space Agency¡¯s atmospheric reentry demonstrator, built by Thales Alenia Space, arrived today at the Guiana Space Center in Kourou.
Government regulations and industry mandates are ever-evolving which creates complex regulations. Thales offers data protection solutions to become compliant today and stay compliant in the future.¡
Explore the impact of the CFPB¡¯s new Personal Financial Data Rights rule and how it aims to empower consumers, drive competition, and reshape open banking in the U.S.
The Cybersecurity Maturity Model Certification (CMMC) is the DoD¡¯s latest verification mechanism designed to ensure that cybersecurity controls and processes adequately protect Controlled¡
The world relies on Thales to protect and secure access to your most sensitive data and software wherever created, shared or stored. Building an encryption strategy, licensing software, providing¡