Data breaches continue to make the news on a regular basis and payment details are high on the hacker’s shopping list when it comes to protecting information. We reported yesterday on Intel introducing a new secure solution for protecting payments and card providers are engaged in a continuing arms race to stay secure. The latest part of this is the introduction of more secure EMV (EuroPay, MasterCard and Visa) compliant payment terminals around the world. Banks are issuing the new chip cards as current cards expire or need replacement. Retailers are installing new chip-enabled terminals.
As the holiday shopping season approaches keeping your details safe as you hit the shops is at the top of many people's thoughts. We spoke to Carolyn Balfany, SVP, Product Delivery and EMV of payment card specialists MasterCard to find out about what consumers can do to help protect themselves as they shop.
Recent high profile security breaches involving retailers like Target and Neiman Marcus mean that people are increasingly aware they may be vulnerable when shopping online. Yet many don't fully understand the landscape that lies behind hacking and why it’s such a lucrative business.
With Christmas and its associated e-commerce peak fast approaching we spoke to Kelly Yee, Vice President of secure email provider Penango who has a wealth of security systems experience in both the public and private sectors. Here are her views on how hackers work and how we can guard against becoming victims over the holiday season.
As we all carry out more of our day-to-day transactions online and access the internet through a wider range of devices, we're opening ourselves up to greater potential risk.
Add in the constant battle of security providers to stay ahead of hackers and malware writers and it's easy to doubt if you can ever stay truly safe online. Joe Siegrist CEO of password management specialist LastPass thinks that although it's not 100 percent possible to hack-proof yourself, you can significantly reduce your risk, we spoke to him to find out how.
Data security used to be primarily about physically controlling where information was stored. But over the last few years the move towards greater use of mobile devices and increasing reliance on email for business communication has made securing information much more of a challenge.
The solution many organizations have turned to is encryption, particularly for emails, but is this the answer? Cloud collaboration specialist Open-Xchange is launching OX Guard, a fully integrated email security and encryption add-on to its OX App Suite.
Following on from Edward Snowden's revelations about the NSA's activity there have been increasing concerns about just how secure our data is, particularly if it's stored in the cloud. Indeed it's reckoned that the cloud industry faces losing billions of dollars in revenue to privacy concerns.
Yet some experts believe that storing data in the cloud is still safer than keeping it in-house. We spoke to Orlando Scott-Cowley, evangelist, strategist and technologist of email management specialist Mimecast to find out why.
As businesses face new challenges from employees use of public cloud services along with demands to allow BYOD use, they're increasingly looking for ways to monitor and control the activity of staff on the web.
We spoke to Brian Azzopardi, founder and CEO of web filtering specialist Rawstream about how enterprises can meet these new demands and why existing products aren’t always up to the task.
Coast, from Norwegian developer Opera, is a browser designed specifically for iPhones and iPads. Unlike other browsers it’s been built for simplicity. Instead of buttons, the app uses swipes for navigation. Gestures have replaced the typical functions. Despite this ease, Coast offers most of the features you could want, including a powerful, intuitive search and address bar that suggests keywords and site thumbnails as you type.
I spoke to Coast's creator, Huib Kleinhout, about the browser and his plans for the future.
Windows XP support officially ended on last month, yet it is estimated around 30 percent of businesses are still yet to migrate to a new operating system.
Sumir Karayi, CEO of IT efficiency company 1E, explains why 'Zero-Touch Migration' offers the best approach for those businesses that need a rapid route to moving away from Windows XP to minimize the impact on security, desktop performance and the user experience.
Removing the traditional Start button and menu from Windows 8 was a bold move for Microsoft. Unfortunately the tech giant underestimated just how attached to it users were. Rather than embracing the (slightly clumsy) full screen Modern UI, vast numbers of early adopters simply opted to install one of the many Start menus made available by third-party developers.
While most of these programs are straight copies of the Windows 7 Start menu, ReviverSoft has chosen to go down a different route with its product. Start Menu Reviver is a Modern-UI styled touchscreen-friendly Start menu that’s been designed to look as if it’s part of Microsoft’s OS. The recently released Start Menu Reviver 2 improves on the first edition by offering a sleeker design, greater customization, and a Windows 7 mode. I spoke to Davide De Vellis, co-founder of ReviverSoft, about Start Menu Reviver and what he thinks about Microsoft’s plans to introduce a Start menu of its own in a future Windows 8.x.update.
Did you know the average person spends 23 full days a year using their mobile phone? That is around ninety minutes every day. Smartphones have become lifelines for many. What if you were to drop your phone in a toilet and lose everything on it? This nightmare will occur for nearly 100,000 cell phone users in the US every day who will damage their phone just by dropping it in water.
An American inventor has created a cost effective solution. DryBox Rescue is a machine designed to completely dry your phone of all moisture in 30 minutes even 2-3 days after getting it wet. I spoke to David Naumann, Partner/Managing Partner at DryBox to find out more about how it works, and what’s next for the company.
The recent Heartbleed bug, in addition to a general rise in cybercrime activity, has led to companies scrambling to re-evaluate their online security. But how can organizations ensure that have a consistent and reliable approach to protecting themselves?
We spoke to Tanya Bragin the principal product manager at ExtraHop Networks, a global leader in real-time wire data analytics for IT operational intelligence, to find out.
Education is undergoing significant transformations, due in no small part to technology. Video chats give students and teachers the opportunity to interact without even being together in the same room, software makes teaching and learning more effective, reading books can be done without turning even a single page and, for an increasing number of students, jotting down notes has shifted from pen and paper to PCs.
It should not surprise anyone that, in this day and age, eager students can learn new, relevant skills and land good paying jobs through alternative learning programs that require much less of their time to graduate and are more affordable, compared to traditional education. RefactorU is one of the companies which offer alternative learning programs that "challenge" people to reinvent themselves, giving them the chance to learn how to code, manage projects or how to build and fly drones. I chatted with RefactorU CEO Sean Daken to learn more about what it offers, the entailed cost and more.
In recent years the threats faced by both individuals and businesses have changed thanks to the adoption of new technologies like the cloud, a shift towards social engineering attacks, BYOD and more.
We spoke to Egemen Tas, vice president of engineering for leading certificate authority and security software provider Comodo to get his view on current threats.
Allowing employees to use their own mobile devices for work has led to a number of new challenges, particularly when it comes to keeping devices and data secure.
We talked to PJ Gupta, CEO of mobile security specialist Amtel about the risks BYOD presents to enterprises and what they can do to ensure they remain safe.
It's sometimes said that big data is like teenage sex, everyone talks about it but few are actually doing it. To which you could add that those who are doing it aren't really sure if they’re getting it right.
In an effort to find out how big data is being used in the real world, we spoke to the heads of three startup companies which are employing it in unique ways to pursue specific business opportunities.