Steven Elefant, CIO of Heartland Payment Systems, doesn't believe in software security. "There is no such thing as totally secure software anymore, and there probably never will be," he says.Elefant ...
Addition of ID TECH's PCI P2PE validated solution with T2's proven PARCS platform enables secure transactions, delivers faster throughput, and reduces PCI compliance costs for parking operators ...
PARIS--(BUSINESS WIRE)--VeriFone Holdings, Inc. (NYSE: PAY), today announced that its VeriShield Protect end-to-end encryption solution for card payment security will be available for use with the EMV ...
New research that shows smart cards with encrypted RFID chips might not be as secure as previously thought is raising concerns in Boston, where the subway CharlieCards use just such technology. The ...
As a number of companies push various strategies for the end-to-end encryption of payment card data, the Smart Card Alliance weighed in Monday with what it considers a simpler alternative: wider use ...
The U.S. Department of Education is rolling out desktop encryption software in a way that links the cryptographic process to employees’ government-issued Personal Identity Verification (PIV) smart ...
Tumulak said the Ingrian encryption devices are typically deployed close to the credit-card data sources, including file servers and mainframe. The DataSecure appliance line supports both public- and ...
On average, it takes businesses 287 days to find and contain a data breach, giving attackers over nine months to access and steal any records they want from the database. However, encrypting those ...
Your phone or tablet holds a lot of personal data about you and your life. Text messages, personal and business contacts, emails, credit card information, private photos and videos — all of these ...