Please turn on your JavaScript for this page to function normally.
Towards secure tokenization algorithms and architectures

Tokenization – the use of surrogate values for sensitive data – is all the rage. Although it is often sold as an alternative to encryption, it is at the core a …

Concerned with the vulnerability of authentication tokens?

Since RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens, organizations …

RSA admits SecurID tokens have been compromised

RSA has finally admitted publicly that the March breach into its systems has resulted in the compromise of their SecurID two-factor authentication tokens. The admission comes …

Attack against Lockheed Martin result of previous RSA breach?

Lockheed Martin, one of United States’ largest military contractors, has experienced an attack against its computer networks, and speculations abound on whether the …

Managed cloud-based tokenization service

nuBridges announced nuBridges Protect Tokenization as a Service (TaaS), a cloud-based tokenization service for national and multi-national companies that want to protect …

Don't miss

Cybersecurity news