Q&A: ATM Remote Key Loading

by Futurex on August 22nd, 2016

According to the Federal Reserve, automated teller machines (ATMs) are the second most commonly used method of interacting with financial institutions. This Q&A outlines the physical and logical protection needed for the rapidly growing number of ATMs.

Read More

Defining Insider Attacks

by Futurex on August 16th, 2016

A malicious outside is often portrayed as a person with a black hoodie, typing viciously on a keyboard to extract sensitive data from the depths of an organizational IT infrastructure. Organizations expect these attacks; they know the enemy and prepare for it. But what about the attacks you don’t expect? I am going to talk about insider attacks, who they are, and why I think this is so important to set up security measures to protect your organization from the inside out.

Read More

​5 Reasons to Establish an Enterprise CA and RA Infrastructure Using Futurex Devices

by Futurex on August 10th, 2016

Enterprise-class organizations often deal with large numbers of certificates and certificate requests. To deal with these, traditionally, organizations use a certificate authority (CA) to generate, issue, and revoke certificates and a registration authority (RA) to process requests for new certificates for users, devices, applications, documents, clients, servers, and more.

Read More