Steven Elefant, CIO of Heartland Payment Systems, doesn't believe in software security. "There is no such thing as totally secure software anymore, and there probably never will be," he says.Elefant ...
PARIS--(BUSINESS WIRE)--VeriFone Holdings, Inc. (NYSE: PAY), today announced that its VeriShield Protect end-to-end encryption solution for card payment security will be available for use with the EMV ...
As a number of companies push various strategies for the end-to-end encryption of payment card data, the Smart Card Alliance weighed in Monday with what it considers a simpler alternative: wider use ...
EasyJet and Chiltern Railways have acted quickly to close a security vulnerability found to be affecting 16 companies worldwide, according to security firm Wandera, but EasyJet says it has yet to see ...
The U.S. Department of Education is rolling out desktop encryption software in a way that links the cryptographic process to employees’ government-issued Personal Identity Verification (PIV) smart ...
On average, it takes businesses 287 days to find and contain a data breach, giving attackers over nine months to access and steal any records they want from the database. However, encrypting those ...
Bank of America provides various credit card machine options, including countertop and portable devices, to fit different business needs. Their POS solutions accept multiple payment types, like credit ...
With major data breaches occurring on a regular basis, encryption vendors are going into hyperdrive, touting the need for their products. However, encryption is only one aspect of protecting your ...
Your phone or tablet holds a lot of personal data about you and your life. Text messages, personal and business contacts, emails, credit card information, private photos and videos — all of these ...