Posted on 12th Jun 2012 by Paul Beverly
The internet will only get bigger and better. Or, that’s an impression you get from reading some of the reports compiled by the likes of Boston Consulting Group, McKinsey and any of the organizations looking at the impact of the Internet on our future economies. These reports are looking at the future of our economies, […]
Posted on 16th Apr 2012 by Gemalto
When it comes to computer hackers going after corporate data networks, “we’re not winning,” FBI executive assistant director Shawn Henry told Devlin Barrett of the Wall Street Journal last week. The comment is true, considering that 2011 brought us 535 breaches, with 30.4 million sensitive records involved. The biggest breaches included Sony, Epsilon and NASDAQ. […]
Posted on 29th Sep 2011 by Gemalto
Despite frequent reports of email hacks and enterprise data breaches, the username and password method for authentication is still one of the primary security measures used today. How do we create secure online identities?
Posted on 22nd Aug 2011 by Gemalto
In light of all the recent cyber attacks costing companies money, reputation and customer trust, stronger security and additional layers is increasingly becoming top of the shopping list for IT professionals. But there is still some confusion as to what are the best security elements that need to be in place to provide the best […]
Posted on 12th Jul 2011 by Gemalto
Last week I blogged about how the new Federal Financial Institutions Examination Council (FFIEC) guidelines were highly welcome and outlined what issues they would help address. Today I am continuing with the series on these guidelines by outlining what else they could (and perhaps should) have included.
Posted on 10th Jun 2011 by Michael Magrath
It is critical that consumers are certain that the site they visit is the one they intended to access. A new policy signed by the Obama Administration will change the way we do business on the internet.
Posted on 18th May 2011 by John Ahlberg
Adding an additional security device into online banking at the client’s own PC, commonly referred to as multi-factor authentication, significantly changes the game for cyber criminals. This might take the form of a bank-issued smart card and individual reader or a USB token that the bank customer uses when online.