Posted on 14th Mar 2012 by Gemalto
Facebook and Google have been under the spotlight recently for the way they deal with online identities. These are just some of the most high profile examples, but have helped drive heightened awareness of our online identities and privacy settings. This week’s SXSWi is understandably awash with debates about what the future might look like [...]
Posted on 10th Jan 2012 by Ray Wizbowski
If you were on Twitter on 9th January during CES 2012 at the time of the Intel press conference you would have seen the Twittersphere explode following the unveiling of Intel’s new ultrabook. That wasn’t the reason for all the tweets, however swanky the ultrabook looks and feels. The reason, in my view, is that [...]
Posted on 1st Sep 2011 by John Ahlberg
Using secure eBanking devices reduces online fraud because a hacker cannot access (or take) money from your online banking accounts using only your stolen login information. The hacker would also need the device, a smart bankcard and reader or a secure USB token. Still not convinced you should use secure eBanking devices? Read on!
Posted on 22nd Aug 2011 by Ray Wizbowski
In light of all the recent cyber attacks costing companies money, reputation and customer trust, stronger security and additional layers is increasingly becoming top of the shopping list for IT professionals. But there is still some confusion as to what are the best security elements that need to be in place to provide the best [...]
Posted on 21st Jul 2011 by John Ahlberg
In the last of our series of online banking infographics we show our ten steps for implementing a secure service. The most important step is to properly plan their deployment taking into account not only the technical constraints but also employee and customer communication.
Posted on 12th Jul 2011 by Gemalto
Last week I blogged about how the new Federal Financial Institutions Examination Council (FFIEC) guidelines were highly welcome and outlined what issues they would help address. Today I am continuing with the series on these guidelines by outlining what else they could (and perhaps should) have included.
Posted on 10th Jun 2011 by Michael Magrath
It is critical that consumers are certain that the site they visit is the one they intended to access. A new policy signed by the Obama Administration will change the way we do business on the internet.
Posted on 31st May 2011 by Ray Wizbowski
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.
Posted on 22nd May 2011 by Ray Wizbowski
Email is so convenient that we use it to send things which should really be protected by encryption.
Posted on 19th May 2011 by John Ahlberg
Online trust is now a national priority in the United States, and banks’ face-to-face connection with clients positions banks as an identity broker, but only if they get identity authentication right.