Consumers are increasingly concerned about payment card fraud, but it remains to be seen how much work they’re willing to do to protect themselves when they’re not directly liable for monetary losses from stolen cards.
Before using Amazon Web Services (AWS), it’s important to understand that as an IaaS provider, AWS is only responsible by default for the security of its cloud infrastructure. AWS goes through great efforts to make customers aware of their responsibilities through the AWS Shared Responsibility Model. The web pages explaining the basics of AWS services frequently reference the model to offer complete transparency into which responsibilities are always taken care of by AWS and which are to be handled by the customer.This white paper is intended to help you make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization’s situation and needs.
As incidents such as the Equifax breach create more urgency to move beyond static identifiers and authentication methods, Visa is getting aggressive about pushing dynamic tools to vet and shield identity.
The National Institute of Standards and Technology is telling agencies and companies that collect or store data to change the way they have been protecting their networks — and its guidance is likely to soon spill over to financial services and payments.
The commercial potential of internet-connected devices appears bound only by imagination and comfort. For security companies, there's a similar broad horizon as watches, refrigerators and other everyday items become tools for payments.
North America remains a favorite target for hackers, with incidents at the point of sale rising dramatically in 2016 and payment card data again proving to be the most at risk, according to new research from Trustwave.