President Obama sent a strong message to American consumers and the payments industry by endorsing the highest level of security for government payment cards and terminals. He set the government the task of “leading by example” by calling for “chip & PIN” EMV cards to combat fraud on 3 million credit cards issued to government […]
Posts Tagged ‘authentication’
Posted on 22nd Oct 2014 by Philippe Benitez in Financial Services
Posted on 22nd Oct 2014 by Neville Pattinson in Corporate
Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals. My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]
Posted on 21st Oct 2014 by Pierre Lelievre in Mobile
Trust is a critical part of security and therefore, a key component in the widespread adoption of mobile payment technology. How can businesses build a secure environment to assure consumers?
Posted on 14th Oct 2014 by Philippe Benitez in Financial Services
In our last blog, we looked at the recently-released Hype Cycle Research Report from Gartner and the outlook for NFC technology. Next we will turn to another important technology that was included in Gartner’s Hype Cycle for Payment Innovation: EMV, and the U.S. migration. EMV has been gaining a lot of attention from payments experts […]
Posted on 13th Oct 2014 by Jennifer Dean in Enterprise Security
As Episode VII draws closer, we offer some observations for the leadership of the Galactic Empire to note with regard to managing authenticated access and dealing with cyber threats.
Posted on 7th Oct 2014 by Philippe Benitez in Financial Services
The tech industry has been talking about NFC technology for a long time, and experts have repeatedly posed the same questions: “Are the uses and benefits of this technology realistic, or is it just hype?” And, “When will it become a productive part of the industry?” Gartner’s 2014 Hype Cycles separate the hype from the […]
Posted on 3rd Oct 2014 by Jennifer Dean in
What are the cyber risks executives’ face when traversing the world in search of business opportunities and those all-important face to face meetings?
Posted on 12th Sep 2014 by Nicole Smith in Mobile
CTIA Super Mobility Week showed us that it’s never been more clear that there’s a massive influx of connected devices that are crossing over both work and personal activities. The biggest challenge is no longer in getting connected, but in securely managing all those connections and remembering the myriad of passwords and user names – on […]
Posted on 12th Aug 2014 by Xavier Larduinat in Enterprise Security
The opening up of enterprise IT due to the effects of consumerization is resulting in ever increasing complexity of the infrastructure with a myriad of devices and applications crowded together. Gartner predicts that by 2017, half of employers will require their employees to bring their own devices to the office. This will benefit organizations and […]
Posted on 30th Jul 2014 by Macey Morrison in Enterprise Security
Being in the security business, we hear our customers’ pains and challenges often when it comes to securing their data, and lately the cloud has been the monkey on their back they can’t shake. Shadow IT has given businesses something to think about in regards to understanding their full footprint in the cloud as well […]