Mr. Robot Rewind: What you need to know about your… Posted on 16 November 2017 by Gemalto in Enterprise Security An episode of Mr. Robot demonstrates the need for HSM security - hackers exploit poor information security practices to gain access by stealing user credentials.… Big data security risks: How should you address the threats? Posted on 13 April 2017 by Sharon Ginga in Enterprise Security Big data security risks are increasing the chance of your sensitive data being exposed. The Cloud Security Alliance warns “Security and privacy issues are magnified… How much control do CIOs have over confidential information shared… Posted on 28 June 2012 by Gemalto in Enterprise Security Following on from our recent post on who is responsible for the security function, here is the second in our series of posts revealing the… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.