Five tips to build a compliant SoftPOS app

Five tips to build a compliant SoftPOS app

|
SoftPOS application adoption is growing rapidly, but security and regulatory compliance is vital. Here are five tips for building a PCI CPoC compliant app. The post Five tips to build a compliant SoftPOS app appeared first on Intertrust Technologies ... Read More
Financial app security in 2021: A report

Financial app security in 2021: A report

|
Financial app security is critical for the businesses involved and broader society. We investigated how prevalent their security vulnerabilities are. The post Financial app security in 2021: A report appeared first on Intertrust Technologies ... Read More
Using PKI to secure plug and charge

Using PKI to secure plug and charge

|
The post Using PKI to secure plug and charge appeared first on Intertrust Technologies ... Read More
How application shielding fits into the DevSecOps framework

How application shielding fits into the DevSecOps framework

|
Incorporating application shielding into a DevSecOps framework helps developers strengthen core security and make the security testing and development process more efficient. The post How application shielding fits into the DevSecOps framework appeared first on Intertrust Technologies ... Read More
How application protection helps HIPAA compliance

How application protection helps HIPAA compliance

|
Creating HIPAA compliant apps requires robust application protection measures. Here’s what you need to know. The post How application protection helps HIPAA compliance appeared first on Intertrust Technologies ... Read More
Securing connected cars from cyberthreats

Securing connected cars from cyberthreats

|
Connected car cybersecurity is one of the biggest challenges preventing automobile manufacturers from fully taking advantage of the technology. The post Securing connected cars from cyberthreats appeared first on Intertrust Technologies ... Read More
Five cryptographic key protection best practices

Five cryptographic key protection best practices

|
When it comes to cybersecurity, all too often cryptographic key protection is an afterthought. Here’s what you need to be doing to keep secret keys safe. The post Five cryptographic key protection best practices appeared first on Intertrust Technologies ... Read More
The biggest mobile app threats of 2020: A recap

The biggest mobile app threats of 2020: A recap

|
COVID dramatically increased mobile usage and cyber criminals exploited this opportunity. Here are some of the most notable mobile app threats from 2020. The post The biggest mobile app threats of 2020: A recap appeared first on Intertrust Technologies ... Read More
App security 2020: the year in review

App security 2020: the year in review

|
A look at whether app security kept pace with the dramatic growth in usage during 2020 and what to expect in 2021. The post App security 2020: the year in review appeared first on Intertrust Technologies ... Read More
Top IoT device security mistakes keeping manufacturers up at night

Top IoT device security mistakes keeping manufacturers up at night

|
IoT devices are getting more popular, which is bringing IoT device security, or the lack of it, into the limelight. The post Top IoT device security mistakes keeping manufacturers up at night appeared first on Intertrust Technologies ... Read More
Loading...