IoT Maker Challenge: It could be you

Avid readers of the blog will know we’ve been running a competition to find the next big thing in the Internet of Things. The IoT Maker challenge is now...

Read more

Gemalto M2M Fact or Fiction Quiz: Can you spot tech reality from science fiction?

...

Read more

Trusting in mobile identity in Asia

What’s the one thing you can’t leave your house without: your wallet, or your house keys? Chances are it’s your mobile device....

Read more

‘Making products secure’ – the Gemalto way

There are many companies that claim to secure your digital services, networks, servers and even whatever you have hosted in the cloud....

Read more

The M2M city of the near future – infographic

What do you see in the city of the future?...

Read more
Transport 2014

Five things we’ve learned about the transport industry in 2014

0

The transportation industry is experiencing a fresh wave of innovation and we explore some of the key trends from 2014 that caught our attention.

Phone wallet

Gemalto @ Transport Ticketing London 2015

0

Opening up the world of contactless mobile services at Transport Ticketing London 2015
January saw Transport Ticketing London bring together all of the key players in the transport ticketing world. Representatives from all aspect of the ticketing infrastructure were there to discuss the key topics that are driving, or obstructing, the adoption of new ticketing technologies.

Ball on 1yd line

How the IoT could have saved the Seahawks from Super Bowl disaster at the one yard line

0

Unfortunately for the Seahawks, their last minute drive in the 4th quarter of Super Bowl XLIX fell short at the one yard line. In this post, we look at how the IoT could have saved them from what’s being called one of the worst play calls in NFL history.

Australia_Techtrends2015

Our Top Technology Predictions for Australia in 2015

0

The top trends for tech in Australia in 2015 – Biometric, Mobile ID, and contactless technologies.

IoT Maker winner image with Gemalto logo

The winning idea from our #IoTMaker Challenge: 3G Bushfire Alert System

0

The time has come – our panel of expert judges has come to a decision; they’ve chosen the 3G Bushfire Alert System as the winning idea from our shortlisted IoTMaker Challenge entries. In this post we explore why it’s such a deservedly winning idea.

password

It’s time to move away from traditional passwords and prioritize online security

0

Whilst it’s good ‘password’ is no longer the number 1 password (now it’s number 2), there hasn’t been enough progress with regard to consumer and business habits – multi-factor authentication is the only way to address this safely; in this post, we explain why.

TSH image - Didier - 26 01 15

Using the Trusted Service Hub to accelerate mobile payments adoption in a fragmented ecosystem

0

We look at how the Trusted Services Hub can bridge the fragmentation endemic in mobile payments and accelerate deployments and consumer acceptance of the new services

stressed-man-head-on-laptop-300x199

Mobile authentication – the key to simplifying and securing multiple website logins

0

The average consumer uses 25 different usernames to log in to all their online services, at a cost of convenience and security. How can we address the challenge, improve the user experience and increase our overall security from the hacker threat? Mobile Authentication is one key answer.

SCA Payments Summit 2015

What’s trending at SCA Payments Summit: EMV migration and contactless payments

0

As the EMV migration is in full swing across the United States, contactless and mobile payment opportunities continue to grow, too. The wider availability of mobile payments like Apple Pay and SoftCard is driving this popularity as well.  When contactless payment programs like these incorporate the security of EMV through the use of a secure […]

CJIS-160x160

Record data breaches in 2014 teach important lessons

0

The Identity Theft Resource Center reported that data breaches hit an all-time high of 783 in 2014, and in many instances payment card details were compromised along with personal information like email addresses, phones numbers, or physical addresses. This meant that more payment cards had to be reissued due to breaches in 2014 than in […]