tokenization
Towards secure tokenization algorithms and architectures
Tokenization – the use of surrogate values for sensitive data – is all the rage. Although it is often sold as an alternative to encryption, it is at the core a …
Concerned with the vulnerability of authentication tokens?
Since RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens, organizations …
RSA admits SecurID tokens have been compromised
RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens. The admission comes …
Attack against Lockheed Martin result of previous RSA breach?
Lockheed Martin, one of United States’ largest military contractors, has experienced an attack against its computer networks, and speculations abound on whether the …
Managed cloud-based tokenization service
nuBridges announced nuBridges Protect Tokenization as a Service (TaaS), a cloud-based tokenization service for national and multi-national companies that want to protect …