Please turn on your JavaScript for this page to function normally.
Mark Nelsen
How businesses can integrate token technology into existing payment systems

In this Help Net Security interview, Mark Nelsen, SVP and Global Head of Consumer Product at Visa, discusses the integration of token technology into existing payment systems. …

Jean-Philippe Aumasson
Beyond blockchain: Strategies for seamless digital asset integration

In this Help Net Security interview, Jean-Philippe Aumasson, CSO at Taurus, emphasizes the often-overlooked complexities of key generation, storage, and distribution, …

shopping
Secure transactions top retailers’ wish lists this holiday season

We are amid the busiest retail season of the year, with U.S. retail sales expected to grow 10.5% to a record $859 billion this holiday season compared to 2020. The number of …

hands
Application level data protection hindered by misperceptions and complexities

Companies plan to take extensive actions in the next 12 months to address a broad concern for sensitive data being unprotected in use at the application layer, Entrust and …

Infographic: Devaluing data, fighting cybercrime

For any organization connected to the Internet, it is not a question of if but when their business will be under attack, according to a recent cybersecurity report from …

Tackling the growing web of data residency and privacy regulations

With an increasing number of companies moving to the cloud, we’ve seen a surge in investment by cloud providers to build international datacenters. While these …

A guide to cloud encryption and tokenization

Cloud adoption shows every sign of continuing to grow. The sharing of resources helps businesses achieve savings and agility based on economies of scale but there’s a …

How encryption and tokenization help with cloud services adoption

Today’s CIOs and CISOs are facing continued pressure to adopt the cloud enterprise-wide while managing the increasing operational and security risks associated with it. …

Protegrity expands enterprise big data protection capabilities

Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache …

BYOT: Bring Your Own Token

SecurEnvoy revealed details of its latest release that gives users full flexibility of the device they use, while ensuring complete security to the organization. At the click …

Optical transaction signing device limits ebanking fraud

SafeNet announced the eToken 3500, an electronic signing and strong authentication token-based device that will enable financial services organizations to achieve risk …

Towards secure tokenization algorithms and architectures

Tokenization – the use of surrogate values for sensitive data – is all the rage. Although it is often sold as an alternative to encryption, it is at the core a …

Don't miss

Cybersecurity news