Thursday, 1 October 2015

Chip-and-Pin Credit Cards Overhyped as Security Measure?; Why Kickstarter Went Public (Benefit)

To view a web version of this message, click here

Send this message to a friend


Featured Video

Will Chip-and-Pin Credit Card Technology Really Increase Security?
Chip-and-Pin credit cards have been hyped as a much needed modernization, but will the actually protect the card holders? The answer seems to that question seems to be be "Sort of, a little, but not a whole lot," according to Jerry Irvine, who is a member of the U.S. Chamber of Commerce Cybersecurity Leadership Council and CIO of Chicago-based Prescient Solutions. More security theater? It sounds that way, when Jerry starts reeling off the kinds of attacks the new cards will do nothing to prevent. Even so, October 1 is the date after which merchants are supposed to be liable for fraudulent purchases made with old-style cards, and are supposed to have point of sale terminals that accept "chip and PIN" cards.

====================================================================

Leverage IT Expertise With Managed Services 
IT organizations increasingly look to  IT service providers like IBM to help reduce cost, manage complexity, maintain skills and adopt technology innovation. Read the white paper to find out how managed services and cloud computing can help you deliver on the transformation agenda your business requires. (Plus, get guidance on the top 10 criteria to consider when selecting an external partner.)

Read More

=====================================================================

Additional Features

Why Kickstarter Became a Public Benefit Corporation (video)

Forcing Windows to Auto-Update Security Updates Only?

Ask Slashdot: An Advanced KVM Switch?

====================================================================

Optimized Sourcing in the Hybrid IT Environment

This research paper from Saugatuck Technology discusses the multi-sourced hybrid IT environment, including how to recognize the needs that can increase costs and compromise operations, and how to optimize the environments for peak effectiveness.

Read More

=====================================================================


Follow Slashdot on Twitter and on Facebook.
 
 
You have received this message because you signed up to receive mailings from Slashdot. If you no longer wish to receive this Slashdot Resources newsletter, click the Unsubscribe link below.
You are subscribed to the Slashdot Resources newsletter as samuel.goulder@gmail.com
 

To unsubscribe, click here or send an email to: unsubscribe-47675@elabs10.com

To ensure delivery of this newsletter to your inbox and to enable images, please add slashdot@newsletters.slashdot.org to your e-mail address book or safe senders list.

Slashdot | 225 West Santa Clara Street, Suite 1150 | San Jose, CA 95113

To view our Privacy Policy click here.
 

 

No comments:

Post a Comment