Posted on 31 October 2014 by Jennifer Dean
CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.
Posted on 22 October 2014 by Neville Pattinson
Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals. My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]
Posted on 29 September 2011 by Thales DIS
Despite frequent reports of email hacks and enterprise data breaches, the username and password method for authentication is still one of the primary security measures used today. How do we create secure online identities?
Posted on 22 July 2014 by Thales DIS
Over at CloudEntr, we love to be loved by our customers (spoiler: we love them back), so we were especially excited to receive a little press from one of our customers AVISIAN Publishing, publishers of more than 10 print and digital publications specializing in the identification technology space. AVISIAN shared the same pain as many of […]
Posted on 20 February 2014 by Thales DIS
Here’s a familiar scenario: I hear about a great website/service that interests me. It’s free, but I have to create an account to use the service. I’m not sure I’m going to keep using the service, so I hesitate to set up an account. Then I notice that I can login using my LinkedIn profile, […]
Posted on 06 September 2013 by Jennifer Dean
Recent news surrounding Apple’s iOS7 has been focused on the ‘Frequent Locations’ feature of the system which enables Wi-Fi location tracking. The media buzz surrounding the feature is unsurprising given the furore around privacy in recent weeks and months. However, this tracking feature is hardly hidden by Apple. As The Register’s Bill Ray has correctly […]