What is Cryptocurrency and How Does It Work?
Since the Bitcoin boom of 2017, more people than ever have become interested in cryptocurrency, going so far as to buy it as a form of investment. But cryptocurrency was not designed to be bought and...
View ArticleAre RFID-Blocking Wallets Necessary to Prevent Credit Card Theft?
The security threat from an airborne information transfer is obvious—any in-range reader could capture the same information.
View ArticleE-commerce Grows and Risk Follows. What to Look for in 2021
A core principle in e-commerce security is that more fraud always accompanies more transactions, increasing retailers' risk.
View ArticleIn Search of a Better Customer Experience, Retailers Create Cyber...
As retailers expand their online operations, the sheer expanse of their attack surface makes protection more difficult.
View ArticleGenetec Helps Ensure Organizations Don’t Have to Choose between Privacy and...
“Organizations should never have to choose between protecting the privacy of individuals and their physical security,” said Pierre Racz of Genetec.
View ArticleWhat You Need to Know about the Cyber-Espionage Attack Linked to Russia
The hackers infiltrated systems in the private and public sectors by adding malware to a legitimate software update from SolarWinds.
View ArticleHow Internet of Things Security Is Impacting Retailers
The need for retailers to have a robust process for gaining control over Internet of Things security is only growing.
View ArticleWhy Retailers Should Reach Out to an Ethical Hacker
The world of retail tends to move in cycles—perhaps using an ethical hacker is the next trend in retail security and data protection.
View ArticleT-Mobile’s Recent Data Breach and Two-Factor Authentication
T-Mobile's recent data breaches shows the faults in 2FA using SMS.
View ArticleAn A-Z Plan for Corporate Cybersecurity Success
As cyberattacks increase and become more dangerous, every company must have a solid cybersecurity game plan in place, then follow it closely.
View Article