In a context of ever growing cyber attacks, as revealed by Gemalto’s Breach Level Index study, enterprises need to defend themselves against cyber threats with an integrated approach that combines sound IT policies with multi layered security.
Posts Tagged ‘OTP’
Posted on 7th Jul 2015 by Aditi Mukherjee in Enterprise Security
Posted on 3rd Mar 2015 by Rémi de Fouchier in Mobile
With passwords more vulnerable than ever, and us all being busier than ever before – we need convenient, quick and secure login services; this is where Mobile Connect can help.
Posted on 22nd Oct 2014 by Neville Pattinson in Corporate
Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals. My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]
Posted on 1st Jul 2014 by Ken Abbott in M2M
Earlier this year, Zach Snyder (of Man of Steel, 300 and Watchmen) tweeted a sneak preview of what the new Batman, played by Ben Affleck, will look like in the upcoming blockbuster Batman v Superman: Dawn of Justice. The photo spread throughout the internet and received over 47,000 retweets in just two weeks. This got […]
Posted on 22nd May 2014 by Jennifer Dean in Enterprise Security
It’s happened again, this time to “The World’s Online Marketplace” – eBay. The online auction giant announced yesterday that a database, holding the personal details of up to 223 million users, was hacked. Ebay has asked 128 million users to change their account passwords in the wake of the breach. The cybercriminals were able to […]
Posted on 13th May 2014 by Gemalto in Financial Services
This year’s InfoSec, held at Earls Court in London, did not disappoint.
Posted on 1st May 2014 by Gemalto in Enterprise Security
Authentication is one of the most prominent issues facing the digital world right now. You only have to glance around the Infosecurity conference this year to witness how often the term is displayed and how intensely it’s discussed. With security fiascos such as Heartbleed still fresh in all of our minds, there’s arguably never been […]
Posted on 14th Apr 2014 by Macey Morrison in Enterprise Security
This content was originally posted on our CloudEntr blog site April 11, 2014. The dust is settling on what has been an explosive week in digital security. Just 96 hours ago, Codenomican and researchers at Google announced they had uncovered a major security threat affecting more than 66% of the web. Making CVE-2014-0160 or what they […]
Posted on 20th Feb 2014 by Tom Smith in Enterprise Security
Here’s a familiar scenario: I hear about a great website/service that interests me. It’s free, but I have to create an account to use the service. I’m not sure I’m going to keep using the service, so I hesitate to set up an account. Then I notice that I can login using my LinkedIn profile, […]
Posted on 16th Apr 2013 by Jennifer Dean in Enterprise Security
Law enforcement organizations looking for the best solution to move to advanced authentication and meet the CJIS mandate have received some good news: they now have until 2014. CJIS is the U.S. Federal Bureau of Investigation’s Criminal Justice Information System (CJIS). It is the primary central repository for criminal justice information and the focal point […]