The average consumer uses 25 different usernames to log in to all their online services, at a cost of convenience and security. How can we address the challenge, improve the user experience and increase our overall security from the hacker threat? Mobile Authentication is one key answer.
Posts Tagged ‘security’
Posted on 28th Jan 2015 by Jean-Francois Ouillet in Mobile
Posted on 12th Jan 2015 by Maria Barbieri in Enterprise Security
With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.
Posted on 7th Jan 2015 by Rémi de Fouchier in M2M
Mercedes-Benz announced its latest connected car offering this week at CES, touting a ‘luxury self-driving’ concept. With 90% of cars due to have built-in connectivity by 2020, we discuss the cyber security implications here.
Posted on 5th Jan 2015 by Jennifer Dean in
A look back at some of 2014’s biggest enterprise security stories, and what we’ve learned from them
Posted on 19th Nov 2014 by Shannon Taylor in Enterprise Security
When it comes to cloud security, what are the pressing concerns of IT pros at SMBs? We went straight to the source – IT professionals at SMBs – and asked them. Our colleagues at CloudEntr, with the help of the Spiceworks IT community, recently surveyed 430+ IT pros to find what SMBs were really thinking about the […]
Posted on 14th Nov 2014 by Jennifer Dean in Enterprise Security
Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong authentication technology and staff training.
Posted on 14th Nov 2014 by Dominique Brulé in Mobile
Hybrid security frameworks for NFC payment services.
Posted on 13th Nov 2014 by Dominique Brulé in Financial Services
Apple Pay has the potential to accelerate mobile payments but it needs to go beyond payment convenience in building a compelling proposition for retailers.
Posted on 7th Nov 2014 by Manfred Kube in M2M
We take a look at the latest Swiss-made IoT solution that could change the game for people with care and security needs.
Posted on 7th Nov 2014 by Jennifer Dean in Enterprise Security
The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?