Cybersecurity

Computer security, cybersecurity or information technology security is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Source: en.wikipedia.org

Plaid Taps VGS for Tokenization Services
Plaid Taps VGS for Tokenization Services
May 16, 2022  |  Partnerships

Data privacy provider Very Good Security (VGS) has launched an expanded partnership with data network Plaid to provide tokenization services, the company said in a...

READ MORE >
EMEA Daily: New EU Cybercrime Rules, Tingo’s $900M Merger
EMEA Daily: New EU Cybercrime Rules, Tingo’s $900M Merger
May 13, 2022  |  emea

In today’s top Europe, Middle East and Africa (EMEA) news, the European Parliament, the Council of the European Union and the European member states approve...

READ MORE >
EU Agrees on Cybersecurity Laws to Protect Financial Sector
EU Agrees on Cybersecurity Laws to Protect Financial Sector
May 13, 2022  |  Cybersecurity

The European Parliament, the Council of the European Union and the European member states voted to pass two important pieces of legislation that will tighten...

READ MORE >
African Cybersecurity and Anti-Fraud Firm Identitypass Raises $2.8M in Seed Funding
African Cybersecurity and Anti-Fraud Firm Identitypass Raises $2.8M in Seed Funding
May 12, 2022  |  Investments

Lagos-based cybersecurity and anti-fraud startup Identitypass has secured $2.8 million in seed funding that it will use to grow its suite of products and expand...

READ MORE >
Google Debuts Tool to Remove Yourself From Searches
Google Debuts Tool to Remove Yourself From Searches
May 11, 2022  |  Technology

Google is debuting a way for people to make sure their personally identifiable information is not searchable on its ubiquitous search engine, the company announced...

READ MORE >
PYMNTS Intelligence: How eCommerce Marketplaces Can Leverage Digital Identity Protocols to Prevent Fraud
PYMNTS Intelligence: How eCommerce Marketplaces Can Leverage Digital Identity Protocols to Prevent Fraud
May 09, 2022  |  eCommerce

Get the Full Story Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required....

READ MORE >
Jane on Protecting Retail Customer Data With Digital Identity Verification
Jane on Protecting Retail Customer Data With Digital Identity Verification
May 06, 2022  |  eCommerce

It's a war out there for eCommerce marketplaces right now, as they face a swirl of fraud attempts and bot attacks looking to steal customer...

READ MORE >
PYMNTS AM Radar: Securing IoT; Stablecoin Regs; Hack Me Please; BNPL Gets Physical; ICYMI
PYMNTS AM Radar: Securing IoT; Stablecoin Regs; Hack Me Please; BNPL Gets Physical; ICYMI
May 06, 2022  |  Safety and Security

It’s Friday, May 6 and hard to believe that it was only 24 years ago that Steve Jobs introduced the first iMac. Today, the internet...

READ MORE >
Crowdsourced Bug Bounty Programs Help EU Firms Beat Hackers at Their Own Game
Crowdsourced Bug Bounty Programs Help EU Firms Beat Hackers at Their Own Game
May 06, 2022  |  Cybersecurity

Cyberthreats have heightened in the wake of the pandemic and fraudsters getting more sophisticated by the day, creating countless threats and vulnerabilities that require businesses...

READ MORE >