Enterprise Security

Pros and cons of mobile tokens in authentication

I recently discussed the future of the online banking industry and how the FFEIC should shape its next set of guidelines to ensure the safety of both banks and their customers in the years ahead. However, one area which I didn’t explore in that post is the mobile platform, and the role it has to play […]

Thoughts on Google’s Two-Factor Authentication – Part One

I read an interesting post by Chris Ripley on BlogCritics last week, looking at Google’s two-factor authentication. In case you missed its recent announcement, the search giant has made two-factor authentication available on its email accounts worldwide. This is a great step in the right direction and it’s fantastic to see people like Chris supporting the […]

Is virtualization a security risk? The CIO verdict

As part of our recent look at CIOs’ views on all things security, we asked the world’s IT leaders for their views on virtualization. As one of the most successful technologies of recent years, virtualization was simply too big a subject to ignore. It is commonly accepted that virtualization brings with it some element of […]

CJIS Mandate Update: Law Enforcement Organizations Get More Time to…

Law enforcement organizations looking for the best solution to move to advanced authentication and meet the CJIS mandate have received some good news: they now have until 2014. CJIS is the U.S. Federal Bureau of Investigation’s Criminal Justice Information System (CJIS). It is the primary central repository for criminal justice information and the focal point […]