Posted on 20 February 2014 by Thales DIS
Here’s a familiar scenario: I hear about a great website/service that interests me. It’s free, but I have to create an account to use the service. I’m not sure I’m going to keep using the service, so I hesitate to set up an account. Then I notice that I can login using my LinkedIn profile, […]
Posted on 01 May 2014 by Thales DIS
Open source security has been high on the news agenda in recent weeks, after the Heartbleed vulnerability found in the OpenSSL protocol called into question the safety of millions of websites from across the web in early April. While the fallout from this vulnerability may not appear to be as great as many predicted, the […]
Posted on 22 May 2014 by Jennifer Dean
It’s happened again, this time to “The World’s Online Marketplace” – eBay. The online auction giant announced yesterday that a database, holding the personal details of up to 223 million users, was hacked. Ebay has asked 128 million users to change their account passwords in the wake of the breach. The cybercriminals were able to […]
Posted on 12 September 2014 by Nicole Williams
CTIA Super Mobility Week showed us that it’s never been more clear that there’s a massive influx of connected devices that are crossing over both work and personal activities. The biggest challenge is no longer in getting connected, but in securely managing all those connections and remembering the myriad of passwords and user names – on […]
Posted on 22 October 2014 by Neville Pattinson
Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals. My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]
Posted on 02 June 2015 by Thales DIS
This week, we’re demonstrating our latest enterprise security solutions at InfoSecurity Europe 2015. Hollywood has some lessons to share for security professionals.