Encryption – Elephant in the Room No More
Data encryption is like the elephant in the room – especially with data breaches. It’s easier to say “If we…
DetailsData encryption is like the elephant in the room – especially with data breaches. It’s easier to say “If we…
DetailsIt is October 7th and EMV is now in “full swing” – if you want to call it that. Reports…
DetailsWe all remember Y2K. Doom was looming, and in order to accommodate the new “00” code that electronically signified the…
DetailsHow consumers shop has drastically changed over the last few years, particularly post-COVID. With advancements in technology and increased usage…
DetailsCharles Hoff, CEO and Co-Founder of PCI University, guest blogs today on the importance of choosing products, services and vendors…
DetailsSome hacks require intense technical know-how, but the majority of data breaches are relatively low-tech and low-effort. Even monumental hacks…
DetailsWhen you hear “disruption in payments,” what comes to mind? Is it paying with your fingerprint instead of a credit…
DetailsThe flowers are blooming, the sun is shining, the birds are out — and so are the hackers. Spring may be…
DetailsWhile just about every business has felt the effects from the sudden onslaught of COVID-19, organizations using Salesforce as a…
DetailsDark Reading’s recent article on cybersecurity highlights an in-depth ThoughtLab study of 1,200 worldwide organizations across 14 industries, revealing that…
DetailsThe retail industry kicked off 2024 in the Big Apple at NRF 2024: Retail’s Big Show. Produced by National Retail…
DetailsOn May 1st, Bluefin issued its new white paper on the Value of P2PE in POI and POS environments. The…
Details