The commercial potential of internet-connected devices appears bound only by imagination and comfort. For security companies, there's a similar broad horizon as watches, refrigerators and other everyday items become tools for payments.
Before using Amazon Web Services (AWS), it’s important to understand that as an IaaS provider, AWS is only responsible by default for the security of its cloud infrastructure. AWS goes through great efforts to make customers aware of their responsibilities through the AWS Shared Responsibility Model. The web pages explaining the basics of AWS services frequently reference the model to offer complete transparency into which responsibilities are always taken care of by AWS and which are to be handled by the customer.This white paper is intended to help you make better-informed decisions about the security control options for AWS usage so you can choose the best combination of controls for your organization’s situation and needs.
Cyber and data security provider Thales e-Security has launched a new version of its hardware security module monitor, which allows network operators to watch activity on numerous modules through a single dashboard.
Cybersecurity professionals are having hard time keeping up with the vulnerabilities exposed on a daily basis in networks handling payments or personal data, according to new research from Bay Dynamics.
Attacks on ATMs and point-of-sale machines are getting more sophisticated and frequent. Crooks are trying to get as much use as they can out of their skimming devices before the migration to chip cards is complete.
Leaked documents appear to show NSA analysts were able to hack into Middle Eastern banks’ servers through the Swift service bureau EastNets. The same tools could conceivably be used by cybercriminals and nation-states with more sinister motives.