Do you have strong authentication tools for PCI DSS compliance? Posted on 15 November 2017 by Jennifer Dean in Enterprise Security The deadline to comply with the Payment Card Industry Data Security Standard (PCI DSS) is upon is. Organizations that handle branded credit cards from the… Are you ready for UIDAI? Posted on 08 November 2017 by Claudia Dunphy in Enterprise Security In 2017 the UIDAI, a Government of India statutory authority, mandated the use of HSMs to secure UIDs named "Aadhaar". As Aadhaar contain Personally Identifiable… Why are web applications attacks dangerous for financial institutions? Posted on 07 November 2017 by Maureen Kolb in Enterprise Security Why are web applications attacks dangerous for financial institutions? How should financial institutions begin to assess their needs to prevent data from being stolen or… Announcing SafeNet Data Protection On Demand Posted on 06 November 2017 by Sharon Ginga in Enterprise Security Gemalto is excited to announce the launch of SafeNet Data Protection on Demand, our new data security-as-a-service platform to help you deliver cost effective encryption,… 4 Easy steps to cloud access management Posted on 02 November 2017 by Lorna Ayoun-Berdugo in Enterprise Security How do you implement a cloud access management solution? Cloud apps in the enterprise have become mainstream, but moving to cloud-based applications can be challenging.… 90% of Consumers Lack Confidence in the Security of IoT… Posted on 31 October 2017 by David Bisson in Enterprise Security Consumers are increasingly adding Internet of Things (IoT) devices like smart baby monitors and web-enabled thermostats to their home networks. Driving these purchasing trends are… Posts navigation Older posts Newer posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories cost of a data breachdata breachEnterpriseEnterprise SecurityFinancial ServicesGDPRGDPR Breach NotificationGovernmentidentity and data protectionIoTMobilemulti-factor authenticationPhysical and Logical Accesspkipublic key infrastructureSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 12/12/17 @ 18:12 Sébastien Violette Thanks Ntomboxolo. I'm sure you also have some anecdotes to mention. ;-)02/12/17 @ 05:12 Ntombo @Sebastian . Well put 20years evolution of sim!24/11/17 @ 00:11 Alan Mac The simple facts in life anything created by man women can be un-done by the same the problem with any ANSWER is did you ask the correct question because if the question is wrong then you have the wrong answer ! In cloud and information storage I always find that most people ask the wrong question in search of a correct answer!