New Security Podcast and Video – Change Your Mindset Posted on 15 May 2015 by Gemalto in Enterprise Security In his podcast recorded by Help Net Security at RSA this year, you'll learn how the data security changes in the last 5 years have… RSA Conference 2015 Recap: Change Your Mindset Posted on 27 April 2015 by Gemalto in Enterprise Security If there is one thing we can take away from this year’s RSA Conference it’s this: We do not have a technology problem, we have… RSA Conference 2015 in Tweets – Part 2 Posted on 23 April 2015 by Gemalto in Enterprise Security If you missed our experts' sessions and SafeNet and Gemalto booth activities, check out this new batch of tweets capturing great moments from RSA Conference… RSA Conference 2015 in Tweets – Part 1 Posted on 22 April 2015 by Gemalto in Enterprise Security We’ve already had a great time at the SafeNet and Gemalto booth at the 2015 RSA Conference in San Francisco. Check out some of our… RSA Conference 2015: Finally, a Theme with Relevance Posted on 16 April 2015 by Gemalto in Enterprise Security This post originally appeared on SafeNet’s The Art of Data Protection blog – now part of the Gemalto Digital Security blog. It’s fitting that the… Data Security Confidence Index 2015 Results – RSA 2015 Preview Posted on 15 April 2015 by Gemalto in Enterprise Security The new Data Security Confidence Index results highlight perimeter defense spending, how worried IT decision makers are about data breaches, and customer data protection. Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.