Cyber Budgeting is a good subject to tip with as most in the corporate world are squeezed for money flows budget or are with no budget at all. Well the need for cyber budgeting or the lack of it stems from how an
In the current Digital age, the IT estate is not just a critical asset in an IT enable – a data driven business model. It is rather a foundational element on which business models are built. So, while we invest time
We find a lot of our customers having difficulty in differentiating between PIN on Glass and PIN on COTS. We want to clear the air around this confusion. First of all, it isn’t an apple to apple comparison and we
In Part 1, we covered the scope and limitations of the PCI CPoC standard. In this blog, we dive deep into building a CPoC solution in alignment with the standard. The Solution Architecture: As per the standard, a
Part 1: Getting Started on CPoC Introduction Using the upcoming technologies for better and easy user experience is necessary, but as always, new use-cases walk hand-in-hand with new security threats. In the field of