- Select Year
- 2024
- 2023
- 2022
- 2021
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
![](/sites/default/files/default_images/matrix.jpg)
Encryption is often cited as a major brick in the data protection foundation. State, Federal, even industry regulation has made encryption a top of mind priority for businesses…
Read More![](/sites/default/files/default_images/matrix.jpg)
A small restaurant in Utah is taking a stand against one of the biggest regulations affecting the payment security industry. Cicero’s Ristorante in Park City has launched a …
Read More![](/sites/default/files/default_images/matrix.jpg)
The rapid advances in computing platforms and technology has provided significant resources, capacity, and processing capabilities to companies across a wide variety of…
Read More![](/sites/default/files/default_images/matrix.jpg)
Last week the hacking groups Anonymous and TeaMp0isoN announced that they have joined forces in an operation dubbed ‘Operation Robin Hood’ whose mission is ‘to take credit…
Read More![Dedicated Security For Mobile Issuance](/sites/default/files/content/blog/field_image/2020-03/matrix_94.jpg)
Next week I will be speaking at Cartes 2011 on dedicated security for mobile issuance together with Tim Richards from…
Read More![A Quick Guide To The Latest Mobile Security Standards](/sites/default/files/content/blog/field_image/2020-03/matrix_84.jpg)
It has been some time since we last posted on mobile security standards (originally the topic surfaced here when Global Platform started working with the GSMA and EMVCo) but…
Read More