Posted on 26th Feb 2013 by Manfred Kube
Continuing our series of answering questions posed by mobile influencers to coincide with MWC 2013, Zack Martin, of NFC News, asked us: Many European countries have e-ID programs in place, are there any pilots in place to move away from smart cards and put these credentials on mobile devices? What are some of the obstacles around placing [...]
Posted on 11th Dec 2012 by Neville Pattinson
Mobile was a hot topic at this year’s Smart Card Alliance Government Conference, held in Washington D.C. Like other enterprises, federal government agencies want employees to have the convenience and productivity gains of smartphones and tablets, as well as the potential cost savings of bring your own device (BYOD). Meeting this challenge, however, involves finding [...]
Posted on 14th Mar 2012 by Gemalto
Facebook and Google have been under the spotlight recently for the way they deal with online identities. These are just some of the most high profile examples, but have helped drive heightened awareness of our online identities and privacy settings. This week’s SXSWi is understandably awash with debates about what the future might look like [...]
Posted on 10th Feb 2012 by Serkan Ozbey
In the final installment of our series on Digital Turkey, we’ll take a look at the evolution of contactless cards in Turkey. As our previous articles have shown, Turkey is years ahead of many of its European neighbors when it comes to the adoption of numerous technologies, and contactless is no exception. Turkey has the [...]
Posted on 8th Dec 2011 by Ken Abbott
Santander Universities Global Division develops innovative new technlogies, including university smart cards. Vicente Prior de Castro describes the multiple uses for these ID cards, including the latest innovation, EMV contactless payment.
Posted on 3rd Oct 2011 by Michael Magrath
Fraudulent claims and identity theft are widely known as the bane of the Medicare system, as it suffers more than $60 billion in fraud every year through practices like phantom billing and durable medical equipment fraud. The system in place pays first, and then chases the fraud after the fact. Wouldn’t it be better to [...]
Posted on 1st Jun 2011 by Ray Wizbowski
In an increasingly digital and cloud-based world, as we hand over our relationship status and birth dates to Facebook, log our whereabouts on Twitter and Foursquare, upload our photos to Flickr and work off the corporate network from an airport, café or at home, there is one thing we refuse to let go of: gadgets.
Posted on 31st May 2011 by Ray Wizbowski
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.
Posted on 26th May 2011 by Ray Wizbowski
The other cloud, that is! Iceland has captured the headlines again this week with another volcanic eruption causing chaos for European travelers. This once again shows how important it is that employees can continue to be productive even when stranded in a remote location. For President Obama, who is spending the week in Europe, this [...]
Posted on 29th Apr 2011 by Ray Wizbowski
Spoiler: passwords may finally be swept away !