Gemalto is now part of the Thales Group, find out more.
Skip to content
Gemalto: Security to be free

Our blogs: Conversations around digital security

Search
Home
  • Home
  • Mobile
  • Enterprise Security
  • IoT
  • Financial Services
  • Government
  • Software Monetization
  • Featured Bloggers
    • Gemalto (504)
    • Manfred Kube (111)
    • Tim Cawsey (83)
    • Jennifer Dean (62)
    • Marta Bordonada (59)
    • Rémi de Fouchier (53)
    • Arta Sylejmani (41)
    • Mor Ahuvia (39)
    • Dominique Brulé (38)
    • Philippe Benitez (37)
    • Jason Hart (34)
    • Didier Benkoel-Adechy (30)
    • Maria Barbieri (29)
    • Kristel Teyras (23)
    • Haider Iqbal (21)
    • Frederic Martinez (20)
    • Neville Pattinson (20)
    • Sebastien Violette (20)
    • Xavier Larduinat (19)
    • Ken Abbott (19)
    • John Ahlberg (19)
    • Sophie Bessin-Py (18)
    • Brittany Jedrzejewski (16)
    • Juana Catalina Rodriguez (15)
    • Nicole Williams (14)
    • Isabelle Lodo (13)
    • Ronni Kives (12)
    • Jennifer Hindle (12)
    • Sek Leong (12)
    • Sharon Ginga (10)

    Latest blog posts by:

    • Sek LeongSek Leong
    • Neville PattinsonNeville Pattinson
    • Ronni KivesRonni Kives
    • Arta SylejmaniArta Sylejmani
    • Haider IqbalHaider Iqbal
    • Marta BordonadaMarta Bordonada
    See all bloggers
  • Blogroll
    • Amrit Williams blog
    • Communities Dominate Brands
    • GoMo News
    • HIT Consultant
    • ID Theft Security
    • Independent Identity
    • Kantara Initiative
    • Krebs on Security
    • Life as a Healthcare CIO
    • Michael N. Dundas
    • Mobile Marketer Blog
    • Mobile Marketing Watch
    • Mobile Money Asia
    • Mobile Zeitgeist
    • MSearchGroove (MSG)
    • Musings of a mobile marketer
    • Naked Security
    • Network Security Blog
    • NFC World
    • RFID Journal
    • Ric Ferraro's Blog
    • Schneier on Security
    • SecDev
    • Security Nirvana
    • Virginia Benedict
  • Countries
    • Brazil
    • China
    • France
    • Germany
    • Italy
    • Japan
    • Kenya
    • South Korea
    • Spain
    • Turkey
    • UK
    • US
  • Tags
    • 4G
    • Apple
    • Authentication
    • BYOD
    • Banking
    • Biometrics
    • Cloud
    • Connected devices
    • Contactless
    • Convenience
    • Data breach
    • Digital Security
    • EMV
    • Ebanking
    • Encryption
    • Facebook
    • Fraud
    • Gemalto
    • IOT
    • Identity
    • Innovation
    • Internet of things
    • LTE
    • M2M
    • MWC
    • Machine-to-machine
    • MasterCard
    • Mobile payment
    • Mobile World Congress
    • Mobile
    • Mobile marketing
    • Mobile payments
    • Mobile wallet
    • Multi-factor authentication
    • NFC
    • OTP
    • Online banking
    • Password
    • Passwords
    • Payments
    • SIM
    • SMS
    • Security
    • Smartphone
    • Strong authentication
    • Technology
    • Trust
    • Two factor authentication
    • USA
    • Visa
Sort by: Most recent
  • Most recent
  • Oldest
  • Most comments

Rethink Your Enterprise Data Protection Strategy

Posted on 07 October 2019 by Ved Prakash in Enterprise Security

In our latest blog, we rethink the data protection strategy across organizations and shift the focus from securing the network to securing the data itself…

Why Ethical Hackers have an essential part to play in…

Posted on by Tim Cawsey in Enterprise Security

As Cyber Security Awareness month begins, we discuss how employing an ethical hacker can bolster a company’s cybersecurity practices

Zero Trust by Design: Information Security in the era of…

Posted on 02 October 2019 by Haider Iqbal in Corporate

While the adoption of cloud technology has brought countless benefits to our lives it also brings with it a multitude of potential threats. To counter…

Five easy-to-miss Gemalto products that make life easier

Posted on 26 September 2019 by Tim Cawsey in Corporate

We take a look at five Gemalto solutions that we take for granted but help make our day-to-day lives easier

Zero Trust – The new default for Information Security

Posted on 25 September 2019 by Haider Iqbal in Enterprise Security

When it comes to granting access to confidential data at work who can really be trusted? With a Zero Trust mindset the answer should be…

New payment revolution lets consumers manage ecommerce transactions from their…

Posted on 20 September 2019 by Xavier Larduinat in Financial Services

The digital ‘paper trail’ could be a thing of the past as consumers will soon be able to manage online payments directly from their mobile…

Posts navigation

Older posts

From Twitter

Loading...
    More from Twitter

    Subscribe to updates

    Delivered by FeedBurner.
    Submitting this form will open a popup window to the FeedBurner website.

    Latest comments

    • 27/08/19 @ 11:08 Lambert Jean Hi Alexandros, Many thanks for the interest you show on our blog, and on PSD2 in general. About SMS OTP, we of course refer to June 2019’s EBA Opinion Paper, that actually mention it as relevant Possession factor (Table 2, Page 7). Our interpretation on how EBA supports (or does not!) SMS OTP is based on our analyzes of this process’ vulnerability, and the many references of the texts to end to end security of the authentication elements. As a matter of fact, when EBA published its first opinion in June 2018, demonstrating that the current practices with SMS OTP were at least not sufficient to comply, many banks considered it as a severe warning against SMS OTP. This interpretation was also shared by ECSG, the “European Cards Stakeholders Group”, strongly in favor of SMS, in its discussion with EBA. ECSG however always considered evolving to biometrics, for instance, as a must for the future. In summary SMS OTP is seen as an acceptable solution, but EBA however underlines its limits: • It is only one factor (“possession”) and a 2nd factor is needed. On medium term, the usage of SMS OTP without, for instance, an additional password, would have to be reconsidered… • Other security concerns (integrity, confidentiality, SIM swapping…) that we often pointed as risky, even if not emphasized in the paper, are frequently mentioned in various EBA’s texts. At the end of day, it seems now that there is a consensus to say that • SMS is not satisfying, and should at least evolve, possibly be replaced by other methods, and/or be reserved for categories of customers that cannot be reached in another way (Thales/Gemalto message for years already!) • But considering its wide deployment, its acceptance by customers and merchants, and its actual good impacts on fraud, this evolution would take time. That is precisely what the NCAs prepare to do proposing “migration paths” that will be formalized in the next weeks or months, as allowed by EBA in this year’s opinion paper. Your vision “although SMS OTP solution has vulnerabilities, if you connect this solution with a knowledge element (like PIN or password) then you can manage 2FA and SCA”, is a valid approach and I assume it should be backed by NCAs for the short-medium term. But at longer term, in the competition landscape, and to improve the customers’ security, we still say that it should rapidly evolve, and many banks are already in this perspective.
    • 26/08/19 @ 10:08 Tim Cawsey Hi there, please get in touch via the contact form on our website https://safenet.gemalto.com/technical-support/ Thanks
    • 20/08/19 @ 15:08 Sébastien Violette thanks Kareem. ;-)
    Gemalto: a Thales company
    Visit Gemalto corporate site | Blogs FAQ | Privacy Policy | © 2006 - 2019 Gemalto NV
    This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

    • ACTIVITIES
    • Defence & Security
    • Digital Identity and Security
    • Aerospace
    • Space
    • Ground Transportation
    • Market-specific solutions
    • GLOBAL
    • Career
    • Investor
    • Journalist
    • Customer Online
    • SOCIAL NETWORKS
    • Facebook
    • Twitter
    • LinkedIn
    • Instagram
    • Youtube
    Decisive technology for decisive moments
    www.thalesgroup.com
    Be aware that this site uses cookies. Before continuing browsing we advise you to click on Privacy Policy to access and read our cookie policy.OkPrivacy policy