There is no panacea for building a hacker-proof firewall, but there are things that can be done to streamline its management. These best practices provide a starting point for managing your firewall—so you and your company don’t get burned.
Based on its growing popularity, biometric authentication is here to stay. However, its prevalence also comes with rising concerns about the technology's level of security, and the possible implications that can stem from it if compromised. Read more
Filess malware that abuse Windows’ PowerShell are now increasingly becoming more common—from ransomware, click-fraud malware to Trojan downloaders. Here’s a closer look on how to mitigate these threats. Read more
The recent US rollout of the EMV standard has America looking at their new cards, wondering what this new technology can do. With this new payment processing method, will we finally see a decline in fraudulent credit card activities? Read more
A look into three primary architectures that promote a next-generation solution to secure mobile payments. These are encryption plus tokenization, cloud-based PoS systems, and secure element systems. Read more