Syndicated Blog

Intertrust Technologies – Security Blogs
Building Trust for a Connected World
Five tips to build a compliant SoftPOS app

Five tips to build a compliant SoftPOS app

|
SoftPOS application adoption is growing rapidly, but security and regulatory compliance is vital. Here are five tips for building a PCI CPoC compliant app. The post Five tips to build a compliant ...
How code obfuscation helps protect application data

How code obfuscation helps protect application data

|
Code obfuscation secures application data by distracting and confusing attackers. Here’s how it works. The post How code obfuscation helps protect application data appeared first on Intertrust Technologies ...
Financial app security in 2021: A report

Financial app security in 2021: A report

|
Financial app security is critical for the businesses involved and broader society. We investigated how prevalent their security vulnerabilities are. The post Financial app security in 2021: A report appeared first on ...
Using PKI to secure plug and charge

Using PKI to secure plug and charge

|
The post Using PKI to secure plug and charge appeared first on Intertrust Technologies ...
Streaming app security: why you should protect code as well as content

Streaming app security: why you should protect code as well as content

|
The post Streaming app security: why you should protect code as well as content appeared first on Intertrust Technologies ...
How application shielding fits into the DevSecOps framework

How application shielding fits into the DevSecOps framework

|
Incorporating application shielding into a DevSecOps framework helps developers strengthen core security and make the security testing and development process more efficient. The post How application shielding fits into the DevSecOps framework ...
How DUKPT key management works in POS environments

How DUKPT key management works in POS environments

|
The DUKPT key management scheme is one of the cryptographic protocols essential to strong POS security. Here's an overview of how it works. The post How DUKPT key management works in POS ...
Mitigating your Java code security debt

Mitigating your Java code security debt

|
Java code security debt is a major risk, both technically and financially. Here’s what you need to know. The post Mitigating your Java code security debt appeared first on Intertrust Technologies ...
How application protection helps HIPAA compliance

How application protection helps HIPAA compliance

|
Creating HIPAA compliant apps requires robust application protection measures. Here’s what you need to know. The post How application protection helps HIPAA compliance appeared first on Intertrust Technologies ...
Top 2021 banking and fintech security regulations

Top 2021 banking and fintech security regulations

|
As more people move to fintech and digital banking, financial data security compliance is becoming tougher. Here’s what app developers need to know for 2021. The post Top 2021 banking and fintech ...