Posts Tagged ‘Digital Security’

NFC: Beyond the Hype

0

Posted on 7th Oct 2014 by in Financial Services

The tech industry has been talking about NFC technology for a long time, and experts have repeatedly posed the same questions: “Are the uses and benefits of this technology realistic, or is it just hype?” And, “When will it become a productive part of the industry?” Gartner’s 2014 Hype Cycles separate the hype from the […]

Questions Remain for US EMV Migration

0

Posted on 29th May 2014 by in Financial Services

The U.S. migration to EMV chip payments is well underway, with many industry stakeholders on track to meet October 2015 liability shift deadlines.

What is digital security?

0

Posted on 19th May 2014 by in Enterprise Security

A question that many an individual, firm or hacker grapples with. Given the rapid transformation of the digital landscape, it’s only natural that security has evolved at a similar speed, requiring us all to stay abreast of the latest developments and to ensure we have digital security. We believe that digital security is really all […]

96 Hours Later, What Does Heartbleed Mean for Your Business?

0

Posted on 14th Apr 2014 by in Enterprise Security

This content was originally posted on our CloudEntr blog site April 11, 2014. The dust is settling on what has been an explosive week in digital security. Just 96 hours ago, Codenomican and researchers at Google announced they had uncovered a major security threat affecting more than 66% of the web. Making CVE-2014-0160 or what they […]

EMV Payment Security Hits US National Spotlight

0

Posted on 29th Jan 2014 by in Corporate

EMV payment technology has finally gotten its big break in the US in the way of national news coverage. After several recent high-profile payment card data breaches, more Americans have started to ask whether it’s time for the US to abandon magnetic stripe payment technology in favor of more secure EMV. Yes, it’s time. For more […]

Google’s Inactive Account Manager handles Data after Death

0

Posted on 15th Jul 2013 by in Corporate

Last year I discussed the problem of what happens to our digital assets after our lives come to an end. If you haven’t read the post you can find it here. There are already, well documented online services that offer users the chance to live on through their social media threads. Kate Freeman of Mashable, […]

Securing mobile banking for the ‘unbanked’

0

Posted on 4th Jun 2013 by in Corporate

On this blog we often write about NFC technology, mobile payments and the latest technologies using smartphones and digital security to empower our everyday lives. A lot of the time, these innovations and technological advances relate to more developed regions, whether North America, Europe, the Middle East or Asian countries such as South Korea and […]

They may take our lives, but they will never take… our drivers

0

Posted on 26th Apr 2013 by in Enterprise Security

xkcd’s 1200th cartoon, published last week, was another brilliantly satirical look on the way most of us approach security on our laptop: It reminded me of Mel Gibson’s immortal line in the film, Braveheart: “They may take our lives, but they will never take our freedom.” Freedom was the most important thing to the Scots, […]

CJIS Mandate Update: Law Enforcement Organizations Get More Time to Move to Advanced Authentication

1

Posted on 16th Apr 2013 by in Enterprise Security

Law enforcement organizations looking for the best solution to move to advanced authentication and meet the CJIS mandate have received some good news: they now have until 2014. CJIS is the U.S. Federal Bureau of Investigation’s Criminal Justice Information System (CJIS). It is the primary central repository for criminal justice information and the focal point […]

Complexity is the worst enemy of security

0

Posted on 5th Apr 2013 by in Enterprise Security

The phrase ‘less is more’ rings true in many sectors of life, work and society, but few expect it to be used in relation to security. For many, security fits the ‘more the merrier’ platitude – at least that’s what many of my IT security colleagues would promote. Look deeper, however, and there are theories, […]