Skip to content
Gemalto: Security to be free

Our blogs: Conversations around digital security

Search
Home
  • Home
  • Mobile
  • Enterprise Security
  • IoT
  • Financial Services
  • Government
  • Software Monetization
  • Featured Bloggers
    • Gemalto (452)
    • Manfred Kube (106)
    • Tim Cawsey (78)
    • Jennifer Dean (62)
    • Marta Bordonada (59)
    • Rémi de Fouchier (53)
    • Arta Sylejmani (40)
    • Mor Ahuvia (39)
    • Dominique Brulé (38)
    • Philippe Benitez (37)
    • Didier Benkoel-Adechy (29)
    • Jason Hart (29)
    • Maria Barbieri (27)
    • Kristel Teyras (23)
    • Neville Pattinson (20)
    • Tiffany Conway (20)
    • John Ahlberg (19)
    • Frederic Martinez (19)
    • Ken Abbott (19)
    • Haider Iqbal (19)
    • Sebastien Violette (18)
    • Sophie Bessin-Py (15)
    • Xavier Larduinat (14)
    • Brittany Jedrzejewski (14)
    • Nicole Williams (14)
    • Juana Catalina Rodriguez (13)
    • Isabelle Lodo (13)
    • Jennifer Hindle (12)
    • Ronni Kives (10)
    • Eric Billiaert (10)

    Latest blog posts by:

    • Sophie Bessin-PySophie Bessin-Py
    • Didier Benkoel-AdechyDidier Benkoel-Adechy
    • Manfred KubeManfred Kube
    • Jason HartJason Hart
    • Philippe BenitezPhilippe Benitez
    • Rémi de FouchierRémi de Fouchier
    See all bloggers
  • Blogroll
    • Amrit Williams blog
    • Communities Dominate Brands
    • GoMo News
    • HIT Consultant
    • ID Theft Security
    • Independent Identity
    • Kantara Initiative
    • Krebs on Security
    • Life as a Healthcare CIO
    • Michael N. Dundas
    • Mobile Marketer Blog
    • Mobile Marketing Watch
    • Mobile Money Asia
    • Mobile Zeitgeist
    • MSearchGroove (MSG)
    • Musings of a mobile marketer
    • Naked Security
    • Network Security Blog
    • NFC World
    • RFID Journal
    • Ric Ferraro's Blog
    • Schneier on Security
    • SecDev
    • Security Nirvana
    • Virginia Benedict
  • Countries
    • Brazil
    • China
    • France
    • Germany
    • Italy
    • Japan
    • Kenya
    • South Korea
    • Spain
    • Turkey
    • UK
    • US
  • Tags
    • 4G
    • Apple
    • Authentication
    • BYOD
    • Banking
    • Biometrics
    • Cloud
    • Contactless
    • Convenience
    • Data breach
    • Digital Security
    • EMV
    • Ebanking
    • Encryption
    • Facebook
    • Fraud
    • Gemalto
    • IOT
    • Identity
    • Innovation
    • Internet of things
    • LTE
    • M2M
    • MWC
    • Machine-to-machine
    • MasterCard
    • Mobile wallet
    • Mobile banking
    • Mobile marketing
    • Mobile
    • Mobile payments
    • Mobile World Congress
    • Mobile payment
    • Multi-factor authentication
    • NFC
    • OTP
    • Online banking
    • Passwords
    • Password
    • Payments
    • SIM
    • SMS
    • Security
    • Smartphone
    • Strong authentication
    • Technology
    • Trust
    • Two factor authentication
    • USA
    • Visa
Sort by: Most recent
  • Most recent
  • Oldest
  • Most comments

FIC 2019 – Protecting IS attacks starts with Secure Access…

Posted on 15 February 2019 by Sarah Lefavrais in Enterprise Security

Nearly 10,000 people were present in Lille, in Northern France, on January 22 and 23 to participate in the FIC (International Cybersecurity Forum). This meeting…

Are you ready for MWC Barcelona 2019?

Posted on by Alicia Dominguez in Corporate

Getting ready for MWC Barcelona 2019 – what to watch out for if you’re heading to the show

Transforming customer enrolment with Trusted Digital Identity and human-centric design

Posted on 14 February 2019 by Juana Catalina Rodriguez in Mobile

Here’s how service providers can transform the customer enrolment process by combining Trusted Digital Identity with human-centric design.

Cloud, On-Premises, or Hybrid – What Is the Best HSM…

Posted on 12 February 2019 by Sharon Ginga in Enterprise Security

Not all HSMs are created equal. They have different levels of functionality, security, ease of use, etc. – all of which can have a knock-on…

What is the Key Management Interoperability Protocol (KMIP) & the…

Posted on 11 February 2019 by Skylar Davies in Enterprise Security

In today’s business world, the encryption of an organization’s sensitive data-at-rest must now be a fundamental component to any successful cyber security strategy. Whether the…

Top 6 trends driving Trusted Digital Identities in 2019

Posted on by Juana Catalina Rodriguez in Mobile

Ahead of MWC Barcelona, we look into the market trends and dynamics that will shape the digital identity industry in 2019.

Posts navigation

Older posts

From Twitter

Loading...
    More from Twitter

    Subscribe to updates

    Delivered by FeedBurner.
    Submitting this form will open a popup window to the FeedBurner website.

    Latest comments

    • 30/01/19 @ 16:01 Tim Cawsey Hi Ajay, The email address you provided doesn't seem to work. Please take a look at our range of Payment HSMs and get in touch via the contact form on our website https://safenet.gemalto.com/data-encryption/hardware-security-modules-hsms/safenet-payment-hsm/. Thanks
    • 29/01/19 @ 13:01 SHERALI TAGAEV GOOD
    • 23/01/19 @ 14:01 Sebastien VIOLETTE Thanks Kareem. ;-)
    the Gemalto corporate logo
    Visit Gemalto corporate site | Blogs FAQ | Privacy Policy | © 2006 - 2019 Gemalto NV
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
    Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.OkPrivacy policy