Posts Tagged ‘security’

Three top priorities to help banks build loyalty as customers take them up on switch guarantee

0

Posted on 16th Sep 2014 by in Financial-services

With current account ‘switch’ rates up nearly 20% in the UK, what must banks do to build loyalty?

One Device to Control Them All

0

Posted on 12th Sep 2014 by in Telecom

CTIA Super Mobility Week showed us that it’s never been more clear that there’s a massive influx of connected devices that are crossing over both work and personal activities. The biggest challenge is no longer in getting connected, but in securely managing all those connections and remembering the myriad of passwords and user names – on […]

Five things we can learn about the future of contactless payments from the iPhone 6 and Apple Watch

0

Posted on 11th Sep 2014 by in Telecom

Mainstreaming the technology and embedded security are two key ways Apple’s move into NFC is helping the industry

The security worries behind the wearable tech boom

0

Posted on 5th Sep 2014 by in Telecom

Wearable technology is booming but significant security holes need to be addressed.

Gemalto in the W3C : working to add more security to the web

0

Posted on 1st Sep 2014 by in Enterprise

As the W3C celebrates the web’s 25th birthday, we continue to work with the developers of internet browsers, electronics manufacturers and internet service providers to imagine new use cases and features that could become part of the landscape of the world wide web. We’ve been members of the W3C since 2011 and stand alongside Apple, […]

Laetitia Jay tackles the big M2M issues on “The Peggy Smedley Show”

0

Posted on 1st Sep 2014 by in M2m

Recently, our own Laetitia Jay, VP of M2M marketing and services, had the pleasure of being a guest on the world famous (in the M2M world) Peggy Smedley Show. For those who don’t know, Peggy is known as the voice of M2M and connected devices and has her own show broadcast live each Tuesday at […]

Securing a platform – it’s a three-way approach

0

Posted on 12th Aug 2014 by in Enterprise

The opening up of enterprise IT due to the effects of consumerization is resulting in ever increasing complexity of the infrastructure with a myriad of devices and applications crowded together. Gartner predicts that by 2017, half of employers will require their employees to bring their own devices to the office. This will benefit organizations and […]

Accepting Mobile Wallets in a Multi-platform World: What’s a Merchant to Do?

0

Posted on 7th Aug 2014 by in

The U.S. payments ecosystem is evolving as NFC contactless and cloud-based mobile wallet technologies are offering consumers a streamlined payment experience and unique loyalty benefits. While few doubt the benefits mobile will enable, many merchants wonder which technology to accept at the POS as BLE, NFC, QR-code, and barcode-based technologies are all being evaluated by […]

What is Digital Security? – IT Security Assessment is about prevention rather than cure

0

Posted on 5th Aug 2014 by in Enterprise

The digital world is swarming with security perils. April’s Heartbleed Bug was just the latest in a long line of threats looming over individuals and businesses, and according to PwC’s Global Economic Crime Survey 2014, one in four surveyed businesses had experienced cybercrime, with 11 per cent of them hit with financial losses of more than […]

Cloud Security: CloudEntr, Now Secures Logins and Files in a Single Portal

0

Posted on 30th Jul 2014 by in Enterprise

Being in the security business, we hear our customers’ pains and challenges often when it comes to securing their data, and lately the cloud has been the monkey on their back they can’t shake. Shadow IT has given businesses something to think about in regards to understanding their full footprint in the cloud as well […]