Anything you can do, we can do better: the merchant response to mobile payments Following last week’s ATM, Debit and Pre-Paid Forum in Phoenix, AZ one of the most interesting topics under discussion was… Read More
What Makes Your Key Different from Your Neighbours’? Joe Warren, product manager, Network Encryption Products at Thales eSecurity, discusses the importance of high assurance key management. Read More
IEEE Data Breach Demonstrates The Need for Increased Data Protection Measures The Institute of Electrical and Electronics Engineers (IEEE), one of the leading standards-making organisations, suffered the consequences of some sub-par… Read More
And the Hits Keep on Coming: Encryption the Key to Healthcare Data Protection? As I see the seemingly endless reports of breaches it does seem obvious that progress in the protection of healthcare… Read More
Breaching the Perimeter: Data-centric strategies can Help Protect Your Company’s Sensitive Data I recently read a Mandiant research report indicates that Hikit, a backdoor Trojan, has targeted a number of smaller defense… Read More
From the Device to the Server: Google Wallet Simplifies Approach to Mobile Payments Earlier this month, Google announced that consumers would have the ability to enlist their own financial card information onto their… Read More