Blog

How to Improve ATM Security with Remote Key Loading

How to Improve ATM Security with Remote Key Loading

by David Close on September 12th, 2019

Although the technology has been around for years, ATM remote key management is seeing a resurgence in popularity in 2019. Whether due to compliance requirements such as the transition to SHA-2 and the emerging role of the AES algorithm in financial services data protection or simply out of a goal to increase efficiency, this technology is rapidly being adopted around the world. Learn more about the basics of ATM remote key loading in our latest feature with ATM Marketplace.

Read More
Futurizing IoT Security for Smart Cities

Futurizing IoT Security for Smart Cities

by David Close on August 23rd, 2019

The rise of the smart city will bring significant changes to the enterprise data security landscape. Whether you are a city planner, an IoT device manufacturer, or a citizen existing within the smart city, being aware of what's coming is incredibly important. Learn more about the emerging technologies, trends, and best practices in my latest article in Security Magazine.

Read More
Securing the Smart City

Securing the Smart City

by Adam Cason on August 13th, 2019

Today, the fully automated smart city may seem like a distant future -- self-driving cars, smart grids, and the Internet of Things (IoT) -- yet, many components of the smart city not only already exist, but are already integrated into daily city processes. The reality is these complex systems pose severe security challenges.

Read More

Introduction to Data Privacy Legislation

by Futurex on July 15th, 2019

As cyber-attacks and data security breaches become more frequent in today’s digital landscape, multiple countries are seeking to install more stringent regulations for organizations that handle sensitive customer data from each region. This legislation affects all organizations that collect any form of sensitive data including names, addresses, browsing histories, and anything else that could potentially be used to identify or discriminate against a customer. In this blog post, we’ll provide a high-level overview of the common standards to which each new legislation will hold organizations conducting business in their region, as well as what steps organizations can take to become compliant, using GDPR and LGPD as examples.

Read More
123