Analytics

1/2/2018
04:03 PM
50%
50%

Thales Acquires Gemalto, Integrates Digital Business

Thales will combine its digital assets with Gemalto's as part of a new Global Business Unit.

Aerospace and defense firm Thales Group has agreed to buy chipmaker and digital security firm Gemalto in an all-cash transaction costing €51 per share, the companies announced Dec. 17. The bid value represents a total of 5.6 billion euro (6.6 billion USD), Thales reports.

Thales' acquisition comes after three years of investing over €1B in digital tech, including cybersecurity, analytics, and artificial intelligence. It had previously acquired German software firm Sysgo, data security company Vormetric, and analytics/AI business Guavus.

Gemalto's 15,000 employees will join Thales as part of the deal. Thales will combine its digital businesses into Gemalto, which will continue to run under its own name as one of Thales' seven global business units. Gemalto CEO Philippe Vallée will manage the new Global Business Unit. Thales also plans to leverage Gemalto's security tech to provide enterprise and government clients with data security.

Research and development will be the focus of the combined digital security business. Thales reports the combined group will have more than 28,000 engineers and 3,000 researchers, and invest more than €1B in self-funded R&D.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Lessons from My Strange Journey into InfoSec
Lysa Myers, Security Researcher, ESET,  7/12/2018
What's Cooking With Caleb Sima
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14339
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
CVE-2018-14340
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
CVE-2018-14341
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
CVE-2018-14342
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
CVE-2018-14343
PUBLISHED: 2018-07-19
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.