Enterprise Security

Pros and cons of mobile tokens in authentication

I recently discussed the future of the online banking industry and how the FFEIC should shape its next set of guidelines to ensure the safety of both banks and their customers in the years ahead. However, one area which I didn’t explore in that post is the mobile platform, and the role it has to play […]

Gemalto and IBM secure everything from data to applications, wherever…

We use cloud applications everywhere, across many different facets of a company; expenses, project workflows, product development and sales and marketing. Applications are often linked to a company’s central system and if left insecure, end up serving as a gateway for malicious outsiders. They are also increasingly the targets of cyber-attackers to gain privileged access, […]

Small Businesses Face Uncertainty and Risk Over GDPR

Many small businesses across Europe are facing security challenges and concerns with the implementation and enforcement of GDPR. Item-lending website Streetland.com shut down for good due to its creator’s fears that the General Data Protection Regulation (GDPR) imposes too much “uncertainty and risk”.

The Myth of the “Strong” Password

Which password do you think is easier for a hacker to crack – “Th3r3 can only b3 #1!” or “Hammered asinine requirements”? According to some new research from Carnegie Mellon University’s Institute for Software Research, it’s actually the former that is the weaker password.  Why?  Because the password “Th3r3 can only b3 #1!” has grammatical […]