Much like good cakes, the best security solutions have layers. Efficient security policies don’t rely on a single technique. Instead, they integrate several complementary layers. In this post, we explain why this layered approach is needed for modern, digital banking.
Posts Tagged ‘Cybersecurity’
Posted on 23rd Apr 2015 by Arta Sylejmani in Financial Services
Posted on 21st May 2014 by Arta Sylejmani in Enterprise Security
Predictions about the demise of any given technology or way of working often turn out to be premature. However, the claim from Symantec Senior President Brian Dye that antivirus software “is dead” feels like a landmark, not least because Dye’s company has been one of the leading vendors of this software for decades. Speaking to […]
Posted on 11th Nov 2013 by Jennifer Dean in Enterprise Security
Despite the economic downturn in some areas of the world, many businesses are continuing to grow quickly. Turnover and profits are increasing, as is the number of employees. However, and rather unfortunately, with all this positive growth comes unwanted growth in other areas. Naked Security has recently highlighted research from Ernst and Young which reveals […]
Posted on 4th Nov 2013 by Michael Kaiser in Corporate
The old adage that a chain is only as strong as its weakest link is especially true when it comes to making the Internet safer and more secure. Over the past decade, the National Cyber Security Alliance has worked with its government and industry partners, including Gemalto, to ensure there are an abundance of online […]
Posted on 11th Mar 2013 by Monika Jociunaite in Mobile
Do you use your mobile phone purely for calling? If so, you’re missing out! The new mobile era has brought us many possibilities, given us more flexibility and shaped our daily habits with the noble mission of making our life easier. However, everything comes at a price. While mobile devices nowadays are enabled to allow […]
Posted on 27th Feb 2013 by Gemalto in Enterprise Security
Cybersecurity rarely receives much attention in the US political arena, when it should be a top priority. After all, it’s inextricably linked to the strength of our national security so it was great to hear President Obama emphasize the importance of cybersecurity in his State of the Union address last week. The President has signed […]
Posted on 7th Aug 2012 by Neville Pattinson in Corporate
Cybersecurity and the White House have been in the news for the past week after the Obama administration’s cybersecurity bill was blocked in the Senate on August 2nd, despite the president taking to the blogosphere to air his concerns about digital terrorism only a fortnight before. Despite this setback, the U.S. government is still working […]
Posted on 31st May 2011 by Gemalto in Corporate
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.
Posted on 11th Apr 2011 by Tim Cawsey in Corporate
Last Friday, 8th April we kicked off our partnership with the NCPC in Singapore with their launch of the Cyberonia game for all 11 year old school children in the country. This online educational game aims to help children and their parents learn about cyber-security while playing online.