- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![Visa Makes Mobile Acceptance Security Explicit](/sites/default/files/content/blog/field_image/2020-03/matrix_69.jpg)
A few weeks ago there was a very public spat between Verifone, one of the leading providers of payments terminals, and…
Read More![](/sites/default/files/default_images/matrix.jpg)
I wanted to share a recent article from the editorial team at…
Read More![Chip And PIN Gains Momentum In The U.S.](/sites/default/files/content/blog/field_image/2020-03/matrix_70.jpg)
Thales has previously noted in this blog as well as in the media about the US lagging behind the majority of the rest of the…
Read More![](/sites/default/files/default_images/matrix.jpg)
Over the past few weeks, we’ve seen a few blows to some of the world’s larger certificate based security systems. The noise still hadn’t settled around stuxnet, with its stolen…
Read More![Using AES And Triple DES In End-To-End Encryption To Protect Cardholder Data- A New Standard](/sites/default/files/content/blog/field_image/2020-03/matrix_71.jpg)
In order to make compliance with PCI DSS requirement 3, “Protect stored cardholder” data and requirement 4, “Encrypt transmission of cardholder data across open, public…
Read More![Why Can’t I Remotely Manage My HSMs Like I Remotely Manage My Servers?](/sites/default/files/content/blog/field_image/2020-03/matrix_72.jpg)
It’s not only good security practice, it’s common sense that you don’t want any Tom, Dick or Harry (or Eve or Mallory) to be able to change keys or update software on your…
Read More