Posted on 20 November 2018 by
Hardware Security Modules (HSM) are vital to the security of today’s cloud-enabled, digital world. They act as trust anchors that protect encryption and the cryptographic infrastructure of the most security-conscious organizations in the world by securely managing, processing, and storing cryptographic keys. Without them, data, transactions and the increasing number of workloads in the cloud […]
Posted on 25 April 2016 by
In this GDPR summary, find out what the regulation requires and how it emphasizes the use of encryption and other data protection best practices… or else.
Posted on 23 June 2016 by
Network security could have prevented the MongoDB data breach. Are you securing your data? Learn the 3 steps to avoid this security risk.
Posted on 21 May 2015 by
There is no question that technology advancements in mobile payments and wearables are having an impact on the payments industry. Consumers are turning to smartphones and wearables, like festival wristbands and smartwatches, to manage their money in a quicker, more efficient way. Easy, “tap & go” contactless payments are also on the rise. Just last […]
Posted on 24 October 2018 by
Explore the dangers of leaving high-value, sensitive information unprotected and learn how a three-step approach against inevitable data breaches with encryption at its core can help your organization.
Posted on 22 November 2017 by
Uber Data Breach Demonstrates Need for Better User of Authentication, Data Encryption, and Faster Disclosure Uber Technologies Inc. has fired its chief security officer (CSO) and one of his deputies for helping to cover up a 2016 data breach in which hackers stole the personal data of 57 million riders and drivers. On 22 November, […]