Enterprise Security

Driving EMV adoption: the benefit for banks

According to recent reports from Visa, EMV deployment in the US is accelerating. An estimated one million Visa-branded EMV chip-enabled cards had been issued by the end of 2011. In addition to this, Mastercard has finally agreed to join Visa in supporting the technology in the US. EMV, which regular readers by now know stands […]

“12345” thoughts on securing access

Earlier this year, I posted a somewhat comical blog on a list of the weakest passwords being used in corporations. While we all know we will have users that use “password” for their password, it never ceases to amaze me that even with the number of recommendation and best practices available we still see major […]

Strong authentication, not ‘snail mail’, is the answer to cybercrime

In early nineteenth century England, members of the ‘Luddite’ movement protested against the onset of the industrial revolution by destroying the machinery which they believed was jeopardising their careers as skilled tradesmen. Since then the term has become synonymous with all of those who shun technological progress in favour of more antiquated methods. There is […]

Are there limits to NFC and mobile payments?

As a regular follower, you’ll have read a post on the rise of eBanking and mobile payments in the USA. You might also have crossed the Atlantic (via social media) to see for yourself whether London is NFC-ready with our Contactless Challenge – encouraging two mobile influencers to compete to complete several NFC tasks with […]

Medical devices need security too

This quote stood out for me in an article I read on the Bloomberg tech blog recently: “Medical devices have not been a focus of the computer-security industry.” In the article, Jordan Robertson references a new study by the Ponemon Institute that reveals nearly three-quarters of 80 healthcare organizations surveyed in the US said they […]

The Myth of the “Strong” Password

Which password do you think is easier for a hacker to crack – “Th3r3 can only b3 #1!” or “Hammered asinine requirements”? According to some new research from Carnegie Mellon University’s Institute for Software Research, it’s actually the former that is the weaker password.  Why?  Because the password “Th3r3 can only b3 #1!” has grammatical […]