Gemalto

Blogger profile: gemalto

The company behind our blog. Anonymous authors and former employees are assigned the Gemalto pen name. You are still welcome to add your comments and contact us regarding these subjects.

Website: http://www.twitter.com/gemalto


Contact: Gemalto

Get in touch with this author

Posts by gemalto:

What two-factor authentication could mean for Twitter

0

Posted on 30th May 2013 by in Enterprise Security

Yesterday’s announcement from Twitter that it will be adopting a mobile phone-based system of two-factor authentication feels like a landmark of sorts. This is not because it is a ground-breaking use of technology: Gmail, Facebook, Outlook and Hotmail are all employing similar systems and have done so for some time, while online banking has used […]

Sir Alex Ferguson’s legacy for CIOs

0

Posted on 14th May 2013 by in Enterprise Security

Following the news last week that one of the longest-serving managers of a highly successful soccer club in the UK, well-known around the world, is set to retire at the end of the English Premier League season, tributes and tears are pouring forth. That’s right; Sir Alex Ferguson is stepping down from managing Manchester United […]

They may take our lives, but they will never take… our drivers

0

Posted on 26th Apr 2013 by in Enterprise Security

xkcd’s 1200th cartoon, published last week, was another brilliantly satirical look on the way most of us approach security on our laptop: It reminded me of Mel Gibson’s immortal line in the film, Braveheart: “They may take our lives, but they will never take our freedom.” Freedom was the most important thing to the Scots, […]

Could your password crash the market?

0

Posted on 25th Apr 2013 by in Enterprise Security

As recently reported, a hacked tweet from The Associated Press sparked mass market hysteria as it incorrectly reported that President Barack Obama had been injured in an explosion. This led to a brief sell-off in US markets and a blip in share prices. Social media is fast gaining traction in the business world, with investor […]

Complexity is the worst enemy of security

0

Posted on 5th Apr 2013 by in Enterprise Security

The phrase ‘less is more’ rings true in many sectors of life, work and society, but few expect it to be used in relation to security. For many, security fits the ‘more the merrier’ platitude – at least that’s what many of my IT security colleagues would promote. Look deeper, however, and there are theories, […]

Gartner recognizes growing importance of user authentication

0

Posted on 2nd Apr 2013 by in Enterprise Security

This week industry analyst Gartner published its ‘Magic Quadrant’ study of the user authentication market, in which I’m pleased to say Gemalto was named as a leader in the sector. The report acknowledges the growing need for advanced forms of authentication and the shift away from the ‘legacy’ technology of passwords. It also includes some […]

BYOD: The Solution to Password Problems?

0

Posted on 19th Mar 2013 by in Enterprise Security

What does the Bring Your Own Device (BYOD) trend have to do with solving the password problem?  It may actually be the solution.  In fact, the solution is probably already in the hands of your employees—their mobile smartphones. A recent report by the Anti-Phishing Working Group (APWG) noted a startling 30% of PCs worldwide are […]

White House cybersecurity order aims to defend against critical hack

0

Posted on 27th Feb 2013 by in Enterprise Security

Cybersecurity rarely receives much attention in the US political arena, when it should be a top priority.  After all, it’s inextricably linked to the strength of our national security so it was great to hear President Obama emphasize the importance of cybersecurity in his State of the Union address last week. The President has signed […]

Smart Card Alliance Payments Summit 2013

0

Posted on 13th Feb 2013 by in Enterprise Security

It’s a really exciting time to be part of the U.S. payments industry, with the country migrating to chip-based EMV cards and mobile payment solutions being implemented on a range of connected devices. So we made our way to Salt Lake City for the Smart Card Alliance’s 2013 Payments Summit last week with a great […]

The Myth of the “Strong” Password

1

Posted on 1st Feb 2013 by in Enterprise Security

Which password do you think is easier for a hacker to crack – “Th3r3 can only b3 #1!” or “Hammered asinine requirements”? According to some new research from Carnegie Mellon University’s Institute for Software Research, it’s actually the former that is the weaker password.  Why?  Because the password “Th3r3 can only b3 #1!” has grammatical […]