Prime Factors Blog

Turnover in the IT Department Have You Feeling Lost in Transition?

The Perfect Cocktail for an Effective Encryption Strategy

Data Security Breach Responsibility Shifting to C-Suite, Costly Blind Spots Affect Company’s Financial Landscape

If This Isn’t Enough to Make Your Heart Stop...

Bang for the Buck: Why Encryption Provides Effective (and Cost-Effective) Data Security

Famous Data Breaches – and What They Cost

Encryption: The Cost, The Protection, and the ROI

Navigating the Shifting Sands of Data Security and Compliance

Effective Data Security Solutions Balance Security Needs While Optimizing User Experience

Let's Talk Tokenization

Stay Adaptable, Stay Safe: How Encryption Key Management Can Thwart Hackers

6 Statistics that will Help Make the Case for Encryption and Data Security to the C-Suite

How HSMs Keep a Massive Number of Encryption Keys Secure and Usable

What a Full-Service Encryption Tool Looks Like

Dropbox in Healthcare: What File Sharing Means for Patients

Potential HIPAA Changes in 2017

What Does Fraud Look Like in the EMV Era?

Hackers, Hotels and Ransomware: How Key Management Caused a Commotion

Leadership Tips for CIOs Needing to Push Security

A Year in Review: Breaches in 2016

The Surprising Aftermath of Data Breaches

What You Need to Know About PCI DSS 3.2

Why Your Current Cloud Protection Methods Likely Aren't Enough

How the Black Market (Dark Web) Works When Buying and Selling Information

5 Advantages of Using Encryption Technology for Data Protection

Should I Consider Tokenization in My Business?

5 Common Mistakes Made When Implementing Encryption (And How to Avoid Them)

HITECH vs. HIPAA: What You Need to Know

5 Tips for Success in Key Management

Lessons to Be Learned from Major Data Breaches

Five Ways Your Company Can Improve Its Compliance

Why Anti-Malware Simply Isn't Enough to Keep Hackers Out

Hacks of Corporate Systems on the Rise, says PYMNTS.com

Closing the Gaps in Your IT Security: Tips to Get Everything Under Control

Encouraging Customer Trust Through Encryption

Tokenization vs Encryption - Your Questions on Reversibility

Estimates of 2015 EMV Penetration Out-of-line with Experience

3 More Questions about HSM Surveyor

Tokenization vs Encryption - When Should You Use Either...or Both?

HSM Management - Distinguishing Legitimate PIN Management from Attacks?

How Will PCI DSS V3.1 Impact You?

HSM Surveyor and supported hardware security modules -- What next?

Who Really Needs HSM Monitoring?

Healthcare Lacks Breach Warning System - Needs Data-at-rest Encryption

Identity Theft Bonanza: Implications of the Anthem Health Data Breach

How Anonymous is that Anonymized Data in Your Testbed?

Users Will Be Users – Don’t Hold That Against Them

How Our EMV Basics Webinar Led to a Discussion of Global Cybercrime

How Can Obstacles to Enterprise-scale Data Encryption Be Overcome?

Sony Pictures, JPMorgan Chase, and Multifactor Authentication

The HSM Master File Key Guidance PCI Neglected to Give...

Sony Pictures, B.F. Skinner, and Data Protection

A Breach Too Far: #GOP May Have Unleashed Fury on the World

Data Breaches Will Happen -- The Staples Data Breach as a Case Example

Time, Progress, and Data Protection – There Can Be No Standing Still…

Data Protection is Serious Business, But...

Obama & Cryptography – How an Executive Order Will Impact that Market

How to Evaluate the Data Security Practices of Cloud Providers

How Enterprises Bring Public Cloud, Encryption, and Value Together

EMV Basics: How Do We EMV CNP (Card-Not-Present)?

I Want [EMV] Chips with That Sandwich - the Jimmy Johns Data Breach

What Happens When a Someone Swipes an EMV Card in an EMV-Compliant POS

Your Questions about EMV, Encryption Use Cases, & Payment Security

How Should Companies Protect PII

The Fall of Rome, Home Depot, and Key Drivers for PCI Tokenization

14 Signs You Should Add a Cryptographic Key Management System

Key Drivers for PCI Tokenization and Calls for New Standards

Encryption Key Management Use Cases: Three Laws of Data in the Cloud

Encryption Key Management Use Cases: Keys and the Feds

Encryption Key Management Use Cases: Keys & the Cloud

The US EMV Migration Is Working - Counterfeiters Are Running Scared ...

How the Internet of Things Weakens Data Protection

It's Midnight -- Where Do Your Regulators Say Your Data Is Located?

How the Target Data Breach Affects Debit Card Issuers' Plans for EMV

Heartbleed Wound Not Fully Staunched

Human Errors and Data Protection

Real or Hoax, TrueCrypt Insecure Warning Annoucement on Web Page Erodes Trust

Breaking news -- eBay users advised to change passwords

Blackphone – the Spiritual Successor of PGP

Heartbleed Bug and Its Implications for Online Data Protection