Posted on 21 September 2011 by
We’re shortly going to be researching CIOs globally on their views on security and authentication. What their concerns and pressure points are, what the barriers to implementing stronger security seem to be and where responsibility for security sits within an organization. However, we’d like YOU to pose the questions.
What would you ask?
Posted on 27 October 2014 by
See how Gemalto’s R&D team developed a WebRTC-based VOIP demo secured using a SIM card and the W3C secure element access API.
Posted on 21 May 2014 by
Predictions about the demise of any given technology or way of working often turn out to be premature. However, the claim from Symantec Senior President Brian Dye that antivirus software “is dead” feels like a landmark, not least because Dye’s company has been one of the leading vendors of this software for decades. Speaking to […]
Posted on 29 July 2012 by
In the latest of our series of blog posts looking at the results of our recent CIO research, we take a look at the thorny subject of who is ultimately responsible for information security within an organization. Prevailing trends in technology would suggest that maintaining control of IT security is becoming an ever more difficult […]
Posted on 06 June 2013 by
Microsoft has announced new options for ADFS to be deployed with multi-factor authentication solutions, in a far simpler way than before.
Posted on 14 April 2016 by
Part 2 of our strong authentication cheat sheet covers how one-time passwords are generated, what OATH authentication is, and more.