Posted on 12 February 2011 by Jennifer Dean
This year the RSA Conference in San Francisco coincides with the Mobile World Congress resulting in a busy week for Gemalto’s Telecom and Enteprise Security teams.
Posted on 09 May 2011 by Thales DIS
Last week, I was perplexed to have someone ask me: ‘What’s your fax number?’. The relative novelty of receiving a fax led us to wonder why, in this digital age, they are not now totally obsolete? The answer: signatures.
Posted on 27 May 2011 by Neville Pattinson
Now that Pres. Obama has signed the National Strategy for Trusted Identities in Cyberspace (NSTIC), it’s time for the government and private sector to work together to build the ecosystem. Where do we start?
Posted on 31 May 2011 by Thales DIS
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.
Posted on 05 October 2011 by Thales DIS
Our lives are increasingly online, making work and play more convenient and efficient. At the same time, the attacks on our computers and networks continue to increase. It seems like every day we read of a new data breach that has put personal identity information and corporate data in the hands of criminals. Most recently, […]
Posted on 26 October 2011 by Thales DIS
Every week, I read another story predicting the growth of cloud computing. Statistics and predictions abound; the numbers vary but all have growth in common. It sounds great but wow are we going to secure the user identities?