Posted on 6th Nov 2012 by Gemalto
Change is happening. We are in the process of electing a new leader here in the US, which will have global ramifications and it’s an election that is being very closely watched and followed, including on social media. However, it’s not the only important appointment that is being made – remember last month when Neville [...]
Posted on 2nd Nov 2012 by Gemalto
With Election Day less than a week away, many of us in the US are still researching and deciding on our choices for our local and national elections. Others, though, are deciding whether they will even vote at all. Did you know that only 50 to 60 percent of our population makes it to the [...]
Posted on 1st Oct 2012 by Gemalto
The move towards a trusted Internet identity ecosystem is getting closer: The National Institute of Standards and Technology (NIST) has awarded $9 million to five pilot programs for the National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative. According to NIST, the pilots will include new solutions, models, and/or frameworks for healthcare, online media, retail, [...]
Posted on 17th Aug 2012 by Gemalto
It’s that time again – time to decide what you want to see and hear at South by Southwest (SXSW) 2013. Once just a local music festival here in Austin, Texas, SXSW has grown to be the biggest interactive, music and film event of the year – a must attend event on the calendar every [...]
Posted on 24th Apr 2012 by Neville Pattinson
This month marks the first anniversary for the National Strategy for Trusted Identities in Cyberspace (NSTIC) here in the US. They always say, “The first year is the hardest,” but NSTIC has done remarkably well so far. Now is a good time to look back at what’s happened in the first year, and what lies [...]
Posted on 14th Mar 2012 by Gemalto
Facebook and Google have been under the spotlight recently for the way they deal with online identities. These are just some of the most high profile examples, but have helped drive heightened awareness of our online identities and privacy settings. This week’s SXSWi is understandably awash with debates about what the future might look like [...]
Posted on 7th Feb 2012 by Ray Wizbowski
Is the health of your health records at risk? In our quest to make personal health data easily available to medical professionals and reduce the number of paper files, many countries have mandated the use of electronic medical records (EMR). The challenge is that these records are typically not well protected leaving the door wide [...]
Posted on 8th Dec 2011 by Ken Abbott
Santander Universities Global Division develops innovative new technlogies, including university smart cards. Vicente Prior de Castro describes the multiple uses for these ID cards, including the latest innovation, EMV contactless payment.
Posted on 7th Jul 2011 by John Ahlberg
The Americas are no different from other parts of the world – online banking is becoming second nature. The latest instalment of our world tour of ebanking security features cases from across North & South America including Mexico and the USA.
Posted on 31st May 2011 by Ray Wizbowski
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.