Encryption: To Be Or Not to Be

All financial institutions and retailers are looking for solutions to protect credit card and other sensitive data from the moment the magnetic stripe of the payment card is swiped through to the end of the payment processing cycle. The current end-to-end encryption solutions between the merchant system (point of sale or POS device) and the…

Details

The Ever Evolving Role of the Chief Information Security Officer

Over the past few years, there has been an uptick in cybercrime on a mass scale, with hackers gaining access to personal information of millions of people. Breaches at well-known, successful companies such as Target and Home Depot make national news. In more recent years, healthcare organizations are increasingly becoming the target of cyber-attacks. The…

Details

Everything is Compromised

Internet of Things (IoT) means everything is potentially connected everywhere and with everyone.   Assume it is all compromised. As the volume of IoT grows, we should better understand the implications a bunch of tiny powerful computers connecting to each other brings with them.  These devices need the same strong attention we are placing on smartphones,…

Details