Posts Tagged ‘OTP’

96 Hours Later, What Does Heartbleed Mean for Your Business?

0

Posted on 14th Apr 2014 by in

This content was originally posted on our CloudEntr blog site April 11, 2014. The dust is settling on what has been an explosive week in digital security. Just 96 hours ago, Codenomican and researchers at Google announced they had uncovered a major security threat affecting more than 66% of the web. Making CVE-2014-0160 or what they […]

Should your “friend” social login for your business? Visit us at RSA Conference to find out.

0

Posted on 20th Feb 2014 by in Enterprise

Here’s a familiar scenario: I hear about a great website/service that interests me.  It’s free, but I have to create an account to use the service. I’m not sure I’m going to keep using the service, so I hesitate to set up an account. Then I notice that I can login using my LinkedIn profile, […]

CJIS Mandate Update: Law Enforcement Organizations Get More Time to Move to Advanced Authentication

1

Posted on 16th Apr 2013 by in Enterprise

Law enforcement organizations looking for the best solution to move to advanced authentication and meet the CJIS mandate have received some good news: they now have until 2014. CJIS is the U.S. Federal Bureau of Investigation’s Criminal Justice Information System (CJIS). It is the primary central repository for criminal justice information and the focal point […]

BYOD: The Solution to Password Problems?

0

Posted on 19th Mar 2013 by in Enterprise

What does the Bring Your Own Device (BYOD) trend have to do with solving the password problem?  It may actually be the solution.  In fact, the solution is probably already in the hands of your employees—their mobile smartphones. A recent report by the Anti-Phishing Working Group (APWG) noted a startling 30% of PCs worldwide are […]

Tis the Season for… Online Fraud?

0

Posted on 21st Dec 2012 by in Telecom

If you read the news as much as I do, you probably have seen a lot of advice about how to avoid having your financial details stolen this holiday season.  It’s true that conducting banking transactions or shopping online does make you vulnerable to cybercriminals lurking in the background.  But there are a lot of […]

Infiltrating the E-gaming Industry: a hackers pastime

0

Posted on 20th Sep 2012 by in Enterprise

It seems the trend for hackers in 2012 is video games. And they aren’t leaving anyone out: NCsoft’s Guild Wars is the latest video game enterprise to fall victim to hackers, along with last month’s Blizzard Entertainment, the software company behind some of the world’s most popular games, including Starcraft, World of Warcraft and Diablo. […]

What can you expect from Windows Server 2012?

0

Posted on 14th Sep 2012 by in Corporate

The changes to Microsoft’s Windows 8 OS may be obvious – touch oriented user interface grabbing the headlines – but what’s become of the beast that lurks beneath the computing surface? Released to manufacturing on 1st August, and made available at ground level from 4th September, Windows Server 2012 brings with it several changes that […]

Unbreakable Passwords – An unchained melody

0

Posted on 7th Aug 2012 by in Enterprise

Being a security professional I always find it fascinating to hear from the world of code breaking. More often than not, cryptography is the stuff of Hollywood movies (from Mercury Rising, Enigma to Swordfish) but last month I come across a new system of encryption that claims to be ‘unbreakable’. How? You ask. Well, let me […]

TechEd 2012 – Were you there?

0

Posted on 3rd Aug 2012 by in Enterprise

Microsoft may not be renowned for throwing wild parties, but when you gather over 7,500 people in Amsterdam for a week, you’re bound to come back with some stories. I had the pleasure of attending Microsoft’s TechEd conference last month, an event dedicated to conferences, workshops and hands-on sessions with IT professionals and developers. Nestled […]

Security vs Convenience: What are today’s CIOs prioritizing?

3

Posted on 24th Jul 2012 by in Enterprise

In the latest of our posts looking at results of our recent CIO Research project we’re focusing the debate of security versus convenience. Many still consider the two to be mutually exclusive, but does this necessarily need to be the case? I blogged on this topic back in March, following a similar article by Per […]