4 Important trends in cloud security Posted on 16 January 2018 by Jason Hart in Enterprise Security Cloud security challenges confront organizations as they migrate to the cloud. The Ponemon Institute surveyed IT professionals around the globe to identify cloud use and… Cloud security adopted by SFR Posted on 30 April 2014 by Gemalto in Enterprise Security Last year a survey showed that security is still the number #1 barrier to cloud adoption. We’re pleased to share the news that, this year,… Medical devices need security too Posted on 13 December 2012 by Gemalto in Enterprise Security This quote stood out for me in an article I read on the Bloomberg tech blog recently: “Medical devices have not been a focus of… Is Email our Weakest Link? Posted on 27 September 2011 by Gemalto in Enterprise Security Fahmida Y. Rashid’s recent article on email being the main source of data leaks in organizations shines a light on how dependent all professionals have… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.