Posted on 08 September 2011 by Dominique Brulé
An interesting debate has been open on NFC mobile payments services moving from hardware to software-based solutions. But with the risk of an increase in fraud is still a main concern. We feel that software coupled with hardware-based authentication might be the answer.
Posted on 29 September 2011 by Thales DIS
Despite frequent reports of email hacks and enterprise data breaches, the username and password method for authentication is still one of the primary security measures used today. How do we create secure online identities?
Posted on 08 November 2011 by Thales DIS
I read an interesting post by Chris Ripley on BlogCritics last week, looking at Google’s two-factor authentication. In case you missed its recent announcement, the search giant has made two-factor authentication available on its email accounts worldwide. This is a great step in the right direction and it’s fantastic to see people like Chris supporting the […]
Posted on 20 May 2013 by Frederic Martinez
I was recently at the Wallet Wars conference in New York hearing about the opportunities and challenges that the mobile wallet space offers. And what a spectacle it was! In such a fast-moving and evolving industry, it can be hard to keep up with the latest players: Square, Apple, Google, Samsung and Microsoft are all […]
Posted on 13 August 2013 by Neville Pattinson
In the United States, a driver’s license is used for much more than driving; it is often used as a primary source of identification (in lieu of a national ID card) for employment, domestic travel, banking, purchasing, and more. But many states lag behind in using the latest security technology in their drivers’ licenses, leaving […]
Posted on 21 July 2014 by Xavier Larduinat
We now live in an age where reliable and fast information is of paramount importance in our daily lives. Whether banking, communicating, negotiating, or doing any form of business, information on-demand is crucial. Unfortunately, as we’ve become more dependent on access to on-demand banking, contact details, messaging etc., we’ve at times allowed vulnerabilities into our […]