Posted on 11th Jan 2012 by Tim Cawsey
It’s always pleasing to see creative, informed content get the recognition it deserves, particularly in the world of social media so I decided to look at some of the security, telecoms and emerging tech blogs that we’ve been following here at Gemalto.
Posted on 31st May 2011 by Ray Wizbowski
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.
Posted on 27th May 2011 by Neville Pattinson
Now that Pres. Obama has signed the National Strategy for Trusted Identities in Cyberspace (NSTIC), it’s time for the government and private sector to work together to build the ecosystem. Where do we start?
Posted on 9th May 2011 by Ray Wizbowski
Last week, I was perplexed to have someone ask me: ‘What’s your fax number?’. The relative novelty of receiving a fax led us to wonder why, in this digital age, they are not now totally obsolete? The answer: signatures.
Posted on 5th May 2011 by Ray Wizbowski
The storm analogy rages on, but it’s no joke for users of Sony’s gaming network.
Posted on 13th Apr 2011 by Ray Wizbowski
Thinking about adding extra security to your network access? Not sure when to go beyond OTP? Want something stronger for your CEO and IT Managers but heard its complicated? Here are our 4 top tips for a multi-layered approach.
Posted on 29th Mar 2011 by Ken Abbott
Wow! Our first time at Cartes in Asia and we won an award!
Posted on 12th Feb 2011 by Jennifer Dean
This year the RSA Conference in San Francisco coincides with the Mobile World Congress resulting in a busy week for Gemalto’s Telecom and Enteprise Security teams.