Blog
Explore our topics
Publishing the latest updates
Secure your data in the SaaS with Client Side Encryption
Secure your data in the SaaS with Client Side EncryptionBy Cosmian | October 29, 2024 | Security,...
How to deploy applications securely in the public cloud?
How to deploy applications securely in the public cloud? By Cosmian | October 16, 2024 | Security,...
How to guarantee the confidentiality of your data in third-party SaaS applications?
How to guarantee the confidentiality of your data in third-party SaaS applications?| by Cecile | July 18,...
How to protect your data in the public cloud?
How to protect your data in the public cloud?| by Sandrine | June 17, 2024 | Security,...
The importance of disk encryption
Why and how to secure data on your storage units? | by Sandrine | May 23, 2024 | Disk...
Confidential AI for the cloud: Protecting your data with Cosmian
Protecting your data with Cosmian | by Sandrine | May 23, 2024 | Confidential AI In...
Why is client-side encryption essential for businesses?
Why is client-side encryption essential for businesses?by Sandrine | Feb 6, 2024 | Cryptography,...
Confidential VMs are coming! Here’s why you shouldn’t miss out.
Confidential VMs are coming! Here’s why you shouldn't miss out.by Sandrine | Feb 6, 2024 | Cryptography,...
Why a Cloud-External Key Management System (KMS)?
Why use a Cloud-External Key Management System (KMS)?by Sandrine | Feb 6, 2024 | Cryptography, Engineering,...
Intel TDX: understanding the core of Confidential Computing
Intel TDX: understanding the core of Confidential Computingby Sandrine | Feb 6, 2024 | Cryptography,...
Two-Factor Authorization: the ultimate access control
Two-Factor Authorization: the ultimate access controlby Sandrine | Feb 6, 2024 | Cryptography, Engineering,...
Got a few minutes to spare?
Stay in the know on all things encryption
Subscribe to our newsletter and read past editions and blog posts here