It’s 11 p.m.; do you know where your payment devices are? Merchants should be tracking all of them at all times, as those devices can be swapped out by cybercriminals to steal customer data. Joe Majka, Vice President & Chief Security Officer at Verifone, shares...
As the world gets hyper-connected — which means an increase in the Internet of Things and connected devices — there’s one concept that’s top of mind for consumers: security. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to...
A dark web marketplace has met its security match. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our daily newsletter, PYMNTS Today. By completing this form,...
Chief financial officers are generally sanguine about the future, but domestic issues, such as congressional action (or inaction) on tax reform, engender at least some near-term uncertainties, a study by Grant Thornton has found. Get the Full Story Complete the form to unlock this article...
In July, Alibaba announced it was investing $1 billion in its cloud-computing business, Aliyun. Now, it’s clear why. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required. yesSubscribe to our...
The latest research from MarketResearch.com forecasts the global cybersecurity market to jump from $106.32 billion in 2015 to $170.21 billion by 2020.
The damaging circumstances surrounding the breached online cheating website AshleyMadison.com continues to intensify.
A federal court said on Monday that companies that fail to provide their consumers with “reasonable protections” against data breaches can be sued by consumer protection agencies. Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all...
As the nature of security threats, both physical and cyber, continue to evolve so have the strategies companies are using to combat the sophisticated nature of these criminal activities. One of those strategies is the idea of “crowdsourcing” security efforts, which involves security executives sharing...