Reducing credit and debit card fraud by implementing EMV chip card acceptance has become retailers’ top payment issue in 2016, but retailers are also busy with new data security enhancements such as point-to-point encryption and tokenization to better protect payment card data.
With acceptance of mobile and other new forms of payments expected to double in the next two years, a new global study shows a critical need for organizations to improve their payment data security practices.
In an open letter to Barack Obama the National Retail Federation said it outlines achievable solutions that industry must work toward to better protect customers, empower its retail members and effectively safeguard America’s cyberspace against criminal hackers.
Following a massive cyberattack, eBay is reportedly facing a formal investigation with the government over security practices. The online auction site will have to answer questions about what type of security was in place before hackers gained access to the personal data of its 145 million users.
The Internet of Things is an unavoidable part of network topology today, but the connectivity of devices leaves enterprises open for cyber attacks.
March 1, 2014
The Internet of Things is an unavoidable part of network topology today, but the connectivity of devices – not just laptops but medical equipment, printers and surveillance cameras – leaves enterprises open for cyber attacks.
In an effort to thwart snooping from the NSA and other entities, Twitter has implemented "perfect forward secrecy," which should make it impossible to decrypt any stolen or eavesdropped communication in the future.
Consolidation and technological advances are changing the face of the guarding industry. How will this affect enterprise security leaders? Learn more about changes to the security officer services industry as well as the Top Guarding Firms Listing in the December 2016 edition. Also in this issue: a new financial focus on cybersecurity, what to do in your first three months as a new CSO, the ostrich style of security management, and more.