Posted on 26th Feb 2013 by Manfred Kube
Continuing our series of answering questions posed by mobile influencers to coincide with MWC 2013, Zack Martin, of NFC News, asked us: Many European countries have e-ID programs in place, are there any pilots in place to move away from smart cards and put these credentials on mobile devices? What are some of the obstacles around placing [...]
Posted on 11th Dec 2012 by Neville Pattinson
Mobile was a hot topic at this year’s Smart Card Alliance Government Conference, held in Washington D.C. Like other enterprises, federal government agencies want employees to have the convenience and productivity gains of smartphones and tablets, as well as the potential cost savings of bring your own device (BYOD). Meeting this challenge, however, involves finding [...]
Posted on 9th May 2011 by Ray Wizbowski
Last week, I was perplexed to have someone ask me: ‘What’s your fax number?’. The relative novelty of receiving a fax led us to wonder why, in this digital age, they are not now totally obsolete? The answer: signatures.
Posted on 13th Apr 2011 by Ray Wizbowski
Thinking about adding extra security to your network access? Not sure when to go beyond OTP? Want something stronger for your CEO and IT Managers but heard its complicated? Here are our 4 top tips for a multi-layered approach.
Posted on 7th Apr 2011 by Ray Wizbowski
To borrow another sentiment from the Wizard of Oz, we’re not in Kansas anymore. It seems the last six months have been filled with news of significant compromises to what was traditionally thought to be secure data exchanges and data stores. With these threats combined with regulatory pressures, increased cyber-terrorism and waning consumer confidence, layered security is no longer a nice to have – it is a must.
Posted on 30th Mar 2011 by Ray Wizbowski
As with all subjects in the wider IT world, security is not static, therefore, no company is immune to attack. We believe that the increasing sophistication in persistent and evolving attacks aimed at corporations calls for heightened security, at a minimum for companies’ high-risk populations