Risk-appropriate authentication vs machine fingerprinting
A recent Wall Street Journal article on the insecurity of passwords confirmed what many of us have believed for some time – the days of password-only authentication are numbered. As well as...
View ArticleSecuring the Cloud with Protiva Strong Authentication from Gemalto
Pedro Martinez explains the challenges modern companies face in securing their data, particularly given the proliferation of the cloud. Pedro shows how on-site or hosted servers, which manage the...
View ArticleNFC developments at CES 2012
As Near Field Communications (NFC) stories spun like roulette wheels at CES in Las Vegas a couple of weeks ago, the emergence of several new devices caught my eye. For some time now, we have been...
View ArticleApple Mac users beware – charting the unknown waters of malware
As a PC user who converted for a short time to Mac and came back to PC, I’m used to hearing the comments from Apple enthusiasts about the superior security and lack of virus threats on the Mac OS...
View ArticleBYOD: The Solution to Password Problems?
What does the Bring Your Own Device (BYOD) trend have to do with solving the password problem? It may actually be the solution. In fact, the solution is probably already in the hands of your...
View ArticleComplexity is the worst enemy of security
The phrase ‘less is more’ rings true in many sectors of life, work and society, but few expect it to be used in relation to security. For many, security fits the ‘more the merrier’ platitude – at least...
View ArticleCJIS Mandate Update: Law Enforcement Organizations Get More Time to Move to...
Law enforcement organizations looking for the best solution to move to advanced authentication and meet the CJIS mandate have received some good news: they now have until 2014. CJIS is the U.S. Federal...
View Article
More Pages to Explore .....