Blog

Proactively Protecting Sensitive Data

Proactively Protecting Sensitive Data

by Ryan Smith on December 3rd, 2019

As cyber attacks continue to increase around the world, organizations must move to protect their data before it is exposed to potential breaches. Application encryption could be the perfect solution for that – a flexible, top-down approach that encrypts data before it's stored. Learn more about the benefits of application encryption in our latest feature with Infosecurity Magazine.

Read More
Making a Case for Tokenization in the Enterprise

Making a Case for Tokenization in the Enterprise

by David Close on November 8th, 2019

Organizations are increasingly turning to tokenization as a security solution that can protect data across a wide variety of complex systems and applications. While encryption is one of the most effective security controls when implemented properly, the challenges of its maintenance and deployment can still lead to data breaches. Learn more about the benefits of tokenization in our latest feature with Security Boulevard.

Read More
How to Improve ATM Security with Remote Key Loading

How to Improve ATM Security with Remote Key Loading

by David Close on September 12th, 2019

Although the technology has been around for years, ATM remote key management is seeing a resurgence in popularity in 2019. Whether due to compliance requirements such as the transition to SHA-2 and the emerging role of the AES algorithm in financial services data protection or simply out of a goal to increase efficiency, this technology is rapidly being adopted around the world. Learn more about the basics of ATM remote key loading in our latest feature with ATM Marketplace.

Read More

Introduction to Data Privacy Legislation

by Futurex on July 15th, 2019

As cyber-attacks and data security breaches become more frequent in today’s digital landscape, multiple countries are seeking to install more stringent regulations for organizations that handle sensitive customer data from each region. This legislation affects all organizations that collect any form of sensitive data including names, addresses, browsing histories, and anything else that could potentially be used to identify or discriminate against a customer. In this blog post, we’ll provide a high-level overview of the common standards to which each new legislation will hold organizations conducting business in their region, as well as what steps organizations can take to become compliant, using GDPR and LGPD as examples.

Read More
123