{"id":25518,"date":"2019-02-22T19:25:11","date_gmt":"2019-02-22T19:25:11","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/"},"modified":"2019-02-22T19:25:11","modified_gmt":"2019-02-22T19:25:11","slug":"entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/","title":{"rendered":"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/04\/13\/hands_waving_dollar_bills.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>French defence tech conglomerate Thales has flogged off its hardware security module biz nCipher Security, a sale demanded by competition regulators over Thales&#8217; buyout of Gemalto.<\/p>\n<p>nCipher Security, an \u00a387m firm which began its corporate life in the UK, will be acquired by bank cards &#8216;n&#8217; passports biz Entrust Datacard, the artist formerly known as Datacard Group.<\/p>\n<p>Philippe Keryer, Thales&#8217; exec veep of strategy, research and technology, stated: &#8220;This announcement marks a key step in the ongoing process regarding the acquisition of Gemalto which we expect to close by end March 2019.&#8221;<\/p>\n<p>The company said in a statement today that the sale satisfies &#8220;commitments made by Thales to several competition authorities to divest this business to a suitable purchaser in order to ensure a strongly competitive market for GP HSM <em>[general purpose hardware security module]<\/em> solutions and to finalize the acquisition of Gemalto&#8221;.<\/p>\n<p>The deal is subject to approval from a host of countries&#8217; regulators, including the US Department of Justice, the Australian Competition and Consumer Commission, and the New Zealand Commerce Commission. The EU Commission is also required to give its blessing to the sale \u2013 which, on top of all of that, is conditional on Thales actually closing its purchase of Gemalto.<\/p>\n<p>The British hardware encryption company was originally snapped up by Thales <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2008\/07\/11\/ncipher_thales_deal\/\">just over a decade ago for around \u00a350m<\/a>. The price of today&#8217;s sale was not disclosed.<\/p>\n<div class=\"promo_article no_img\">\n<h2 title=\"Scrambling for safety\">Thales swoops on nCipher for hardware encryption goodness<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2008\/07\/11\/ncipher_thales_deal\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>The \u00a34.2bn Gemalto buyout was <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/12\/18\/gemalto_acquired_by_thales\/\">announced in December 2017<\/a> as Thales and Atos duked it out, bidding ever-higher sums in order to acquire the business. The huge amounts of money being flung around were seemingly out of proportion to the embarrassing revelation that a large chunk of the company&#8217;s key business \u2013 secure SIMs for mobile phones \u2013 had been <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2015\/02\/25\/gemalto_everythings_fine_security_industry_hang_on_a_minute\/\">allegedly compromised by British and American spies<\/a> in 2010. At the time Gemalto denied that its SIM encryption keys had been stolen.<\/p>\n<p>Nonetheless, that little blip doesn&#8217;t seem to have stopped Thales. Last year Gemalto <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.gemalto.com\/investors\/documents\">posted<\/a> profits of \u20ac332m on revenues of \u20ac3bn. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7146\/top-5-threat-hunting-myths?td=wptl1810\">Top 5 Threat Hunting Myths<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/02\/22\/thales_sells_ncipher_for_gemalto_buyout\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Profitable secure SIM firm in the bag by March, Thales hopes French defence tech conglomerate Thales has flogged off its hardware security module biz nCipher Security, a sale demanded by competition regulators over Thales&#8217; buyout of Gemalto.\u2026  READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25519,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-25518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-22T19:25:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout\",\"datePublished\":\"2019-02-22T19:25:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/\"},\"wordCount\":364,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/\",\"name\":\"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg\",\"datePublished\":\"2019-02-22T19:25:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/","og_locale":"en_US","og_type":"article","og_title":"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-22T19:25:11+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout","datePublished":"2019-02-22T19:25:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/"},"wordCount":364,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/","url":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/","name":"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg","datePublished":"2019-02-22T19:25:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/entrust-datacard-lined-up-to-unburden-thales-of-ncipher-biz-as-price-for-gemalto-buyout\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Entrust Datacard lined up to unburden Thales of nCipher biz as price for Gemalto buyout"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25518"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25518\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25519"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}