Posted on 12 January 2015 by
With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.
Posted on 06 January 2015 by
We discuss how a new set of technologies we’ve developed into our Sealys Secure Surface portfolio will make it significantly harder to mask Bond’s true identity with fake passports as he jets around the globe.
Posted on 14 November 2014 by
Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong authentication technology and staff training.
Posted on 07 November 2014 by
The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?
Posted on 04 November 2014 by
Money20/20 kicked off yesterday with a perpetual buzz surrounding payments security. This tweet from Dave Birch perfectly sums up what we’ve been hearing in the overflowing conference halls: It’s no wonder that authentication and privacy are hot topics. Consumers are demanding to know their account data is safe and transactions are secure as the number […]
Posted on 31 October 2014 by
CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.