Bluefin Expands PCI P2PE Devices, Application Listings and Component Providers
The role that the payment terminal plays in the PCI-validated Point-to-Point Encryption (P2PE) process is crucial. The terminal is the…
The role that the payment terminal plays in the PCI-validated Point-to-Point Encryption (P2PE) process is crucial. The terminal is the…
The 11th installment of the Verizon Data Breach Investigations Report (DBIR) was recently released, with the goal of informing its…
To stay ahead of hackers, consumers create more elaborate passwords filled with dashes, digits and capitalizations. As a result, our…
65 days into 2018, the hospitality industry saw its first high-profile data breach with Applebee’s. According to the first report…
On April 12th, in conjunction with the Healthcare Information Management Systems Society (HIMSS), Bluefin’s Chief Strategy Officer, Ruston Miles, will…
A few years ago, our fridges, alarm clocks and TVs had a single link to the outside world — a…
Cybersecurity professionals worldwide face an ever-evolving threat landscape that many feel they are ill-equipped to manage. Data breaches at corporations,…
The healthcare industry runs on digital records. And in order for it to operate efficiently, patient files must be accessible…
We’re very pleased to introduce our new Frequently Asked Questions (FAQ) page on PCI-validated Point-to-Point Encryption (P2PE). Did you know…
Since 2005, the Identity Theft Resource Center® (ITRC) has been tracking security breaches, looking for patterns, new trends and any…