News Posted by: dymar on 05/03/2018 10:42

ActivIdentity Seminar

    Seminar Overview As the online threat landscape has changed dramatically, banks, governments and enterprises face security challenges both internally and externally that are constantly evolving. Increasingly sophisticated malware attacks such as Keyboard Loggers and Man-In-The Browser are appearing that are capable of penetrating traditional authentication methods such as usernames and passwords.   These attacks can result in the …

News Posted by: dymar on 05/03/2018 10:42

Thales payShield 9000 awarded

Thales payShield 9000 awarded Best Secure Transaction Solution by SC Magazine       Thales, leader in information systems and communications security, announces its payShield 9000 Hardware Security Module (HSM) has won SC Magazine’s award for Best Secure Transaction Solution. The magazine’s annual awards for the European information security industry recognise those vendors at the forefront of innovative security technology …

News Posted by: dymar on 05/03/2018 10:42

Key Management for PCI DSS

    Avoid The Headaches Associated With Compliance IT Security, Compliance Managers and QSA’s agree that encryption is one of the most effective technologies for achieving PCI DSS compliance. However, encryption has often been ruled out because of the difficulties in managing keys. Until now. Thales nShield Connect simplifies the use of encryption for protecting cardholder data. It can improve …

News Posted by: dymar on 05/03/2018 10:42

Line encryption

Line Encryption     End-to-end encryption or other words known as line encryption, currently widely used for secure transactions, especially in EDC technology. Encryption technology (3 DES, AES), which also include digital signing and verification process (SHA, DSA​​, Elliptic Curve, RSA) sometimes using many of keys and needs to manage. Thus, encryption and key management technologies have become important on …

Page 8 of 15« First...678910...Last »