Corporate Security news and trends

The Cybersecurity Juggling Act Of Buyer-Supplier Connectivity
B2B Payments // September 30, 2019

When cyberattack NotPetya quickly made its rounds, one of its hardest-hit victims — shipping conglomerate A.P. Moller-Maersk — learned firsthand the threat of a supplier base. Maersk Chief Technology and Information Officer Adam Banks spoke earlier this month at a cybersecurity conference, reflecting on that...

When Passwords Become Corporates’ Own Worst Enemy
B2B Payments // February 08, 2019

Cyberattacks are a massive problem for organizations today, and the threat is only growing larger. IBM data said the average cost of a data breach is $3.86 million, with U.S. companies experiencing an even higher average of $7.91 million. Rising frustrations with passwords have churned...

Businesses Fail To Manage Risk Despite Preparing For ‘Major Crisis’
B2B Payments // January 28, 2019

Corporates aren’t prepared to tackle the headwinds of market risks, according to two separate reports released last week. FTI Consulting released its inaugural Resilience Barometer report during the World Economic Forum held in Davos, Switzerland last week. The report explores how companies in G20 nations...

Tanium Secures $6.5B Valuation For Enterprise Security Tech
B2B Payments // October 02, 2018

Enterprise cybersecurity startup Tanium has raised additional funding just five months since its last investment round, according to reports on Tuesday (Oct. 2). Tanium, which provides organizations with an IT security platform, raised $200 million from Wellington Management, Baillie Gifford & Company and Adage Capital Management, pushing...

Quick Reads
Amazon Debuts Palm-Based ID Service Amazon One Enterprise

November 28, 2023
Amazon is bringing its palm-based identity service to the world of corporate security. Amazon Web Services (AWS) announced Monday (Nov. 27) the debut of Amazon One Enterprise, a contactless security tool designed to grant entry to places like offices, airports, hotels and educational facilities. “Today, organizations authenticate employees and other authorized individuals to access buildings and software resources […]