Posts Tagged ‘authentication’

EMV gains steam as President Obama signs Chip & PIN law in the U.S.

0

Posted on 22nd Oct 2014 by in Financial Services

President Obama sent a strong message to American consumers and the payments industry by endorsing the highest level of security for government payment cards and terminals.  He set the government the task of “leading by example”  by calling for “chip & PIN” EMV cards to combat fraud on 3 million credit cards issued to government […]

More than EMV: President Obama’s executive order paves the way for more secure online services

0

Posted on 22nd Oct 2014 by in Corporate

Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals.  My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]

The Security Pyramid: Building a Base for Global NFC Adoption

0

Posted on 21st Oct 2014 by in Mobile

Trust is a critical part of security and therefore, a key component in the widespread adoption of mobile payment technology. How can businesses build a secure environment to assure consumers?

EMV in the USA: Gartner cuts through the Hype

0

Posted on 14th Oct 2014 by in Financial Services

In our last blog, we looked at the recently-released Hype Cycle Research Report from Gartner and the outlook for NFC technology. Next we will turn to another important technology that was included in Gartner’s Hype Cycle for Payment Innovation: EMV, and the U.S. migration. EMV has been gaining a lot of attention from payments experts […]

Key lessons for the Galactic Empire on cyber security and authentication

0

Posted on 13th Oct 2014 by in Enterprise Security

As Episode VII draws closer, we offer some observations for the leadership of the Galactic Empire to note with regard to managing authenticated access and dealing with cyber threats.

NFC: Beyond the Hype

0

Posted on 7th Oct 2014 by in Financial Services

The tech industry has been talking about NFC technology for a long time, and experts have repeatedly posed the same questions: “Are the uses and benefits of this technology realistic, or is it just hype?” And, “When will it become a productive part of the industry?” Gartner’s 2014 Hype Cycles separate the hype from the […]

The rise of the shoulder surfer and the cyber-perils of executive travel

0

Posted on 3rd Oct 2014 by in

What are the cyber risks executives’ face when traversing the world in search of business opportunities and those all-important face to face meetings?

One Device to Control Them All

0

Posted on 12th Sep 2014 by in Mobile

CTIA Super Mobility Week showed us that it’s never been more clear that there’s a massive influx of connected devices that are crossing over both work and personal activities. The biggest challenge is no longer in getting connected, but in securely managing all those connections and remembering the myriad of passwords and user names – on […]

Securing a platform – it’s a three-way approach

0

Posted on 12th Aug 2014 by in Enterprise Security

The opening up of enterprise IT due to the effects of consumerization is resulting in ever increasing complexity of the infrastructure with a myriad of devices and applications crowded together. Gartner predicts that by 2017, half of employers will require their employees to bring their own devices to the office. This will benefit organizations and […]

Cloud Security: CloudEntr, Now Secures Logins and Files in a Single Portal

0

Posted on 30th Jul 2014 by in Enterprise Security

Being in the security business, we hear our customers’ pains and challenges often when it comes to securing their data, and lately the cloud has been the monkey on their back they can’t shake. Shadow IT has given businesses something to think about in regards to understanding their full footprint in the cloud as well […]