Cybersecurity Makes for a Great Hollywood Script: Thoughts from the… Posted on 05 April 2017 by Gemalto in Enterprise Security Hollywood is portraying the cybersecurity industry as action packed and engaging with hackers from the dark side. What can we learn from cybercriminals? How is… Takeaways from Gartner IAM EMEA Summit in London – Part… Posted on 01 April 2015 by Mor Ahuvia in Enterprise Security Telling a friend that you’re going to an identity and access management (IAM) conference may do little to elicit their excitement. But explaining to them… Takeaways from Gartner IAM EMEA Summit in London – Part… Posted on 31 March 2015 by Mor Ahuvia in Enterprise Security If one of your acquaintances has a chronic condition, such as asthma or epilepsy or diabetes—one day, in the not too distant future, they may… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.