Enterprise Security

Risk-appropriate authentication vs machine fingerprinting

A recent Wall Street Journal article on the insecurity of passwords confirmed what many of us have believed for some time – the days of password-only authentication are numbered. As well as highlighting the passwords that no one of sane mind should consider using (‘123456’ or ‘password’, anyone?) it also considers some of the various […]

Thoughts on Google’s Two-Factor Authentication – Part One

I read an interesting post by Chris Ripley on BlogCritics last week, looking at Google’s two-factor authentication. In case you missed its recent announcement, the search giant has made two-factor authentication available on its email accounts worldwide. This is a great step in the right direction and it’s fantastic to see people like Chris supporting the […]

Thoughts on Google’s Two-Factor Authentication – Part Two

In the first of these two posts on Google’s two-factor authentication I discussed Google’s authentication push and how this is a good step forward for spreading strong authentication. Here I explain how this can be extended to the workplace and our online bank accounts. If the goal of strong authentication is protecting critical information resources, […]

Securing the Cloud with Protiva Strong Authentication from Gemalto

Pedro Martinez explains the challenges modern companies face in securing their data, particularly given the proliferation of the cloud. Pedro shows how on-site or hosted servers, which manage the authentication of tokens, help process a unique password for the user, authenticated by back-end systems. Smart, secure and easy solutions help customers and mean companies can […]

Is Apple’s iCloud fit for business?

We’re all thankful for the cloud. One way or another, online storage servers are freeing up our hard drives, minimising our devices and adding a hint of mystery to the world of intellectual property and media ownership. As I confronted the growth of cloud computing in this blog on securing the identities of cloud users, […]

Secure eBanking with Ezio Optical Reader – it’s easy

We recently experienced one of the biggest tech events of the year – CES 2012. A hub of technology launches, consumer experiences and computing giants jostling for attention, one of the key trends at the show was motion-enabled TV and motion-controlled devices (think Tom Cruise using a Minority Report-style control of content on screens and […]