Blog

Join Futurex in Celebrating Data Privacy Day on January 28th

Join Futurex in Celebrating Data Privacy Day on January 28th

by Futurex on January 16th, 2017

In today’s world, where much of our lives are lived while being connected online, there is limitless personally identifiable information (PII) in existence. Identifying data, such as your name, address, and date of birth, is freely available on the web. Also prevalent is the information about terms you search, where you work, where you have lived, which public figures you follow, which restaurants and shops you frequent, and any content you like or favorite. Due to this rich breadth and depth of information, it is important that we collectively make maintaining our privacy hygiene a higher priority.

Read More

Q&A: ATM Remote Key Loading

by Futurex on August 22nd, 2016

According to the Federal Reserve, automated teller machines (ATMs) are the second most commonly used method of interacting with financial institutions. This Q&A outlines the physical and logical protection needed for the rapidly growing number of ATMs.

Read More

Defining Insider Attacks

by Futurex on August 16th, 2016

A malicious outside is often portrayed as a person with a black hoodie, typing viciously on a keyboard to extract sensitive data from the depths of an organizational IT infrastructure. Organizations expect these attacks; they know the enemy and prepare for it. But what about the attacks you don’t expect? I am going to talk about insider attacks, who they are, and why I think this is so important to set up security measures to protect your organization from the inside out.

Read More

​5 Reasons to Establish an Enterprise CA and RA Infrastructure Using Futurex Devices

by Futurex on August 10th, 2016

Enterprise-class organizations often deal with large numbers of certificates and certificate requests. To deal with these, traditionally, organizations use a certificate authority (CA) to generate, issue, and revoke certificates and a registration authority (RA) to process requests for new certificates for users, devices, applications, documents, clients, servers, and more.

Read More