Posted on 12 February 2011 by Jennifer Dean
This year the RSA Conference in San Francisco coincides with the Mobile World Congress resulting in a busy week for Gemalto’s Telecom and Enteprise Security teams.
Posted on 09 May 2011 by Thales DIS
Last week, I was perplexed to have someone ask me: ‘What’s your fax number?’. The relative novelty of receiving a fax led us to wonder why, in this digital age, they are not now totally obsolete? The answer: signatures.
Posted on 13 May 2011 by Thales DIS
Top tip number 2. in our series of 5 reasons to use digital security devices for eBanking. More security is needed where cyber criminals are attacking — at the client’s PC used for online banking.
Posted on 31 May 2011 by Thales DIS
When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.
Posted on 10 June 2011 by Dominique Brulé
Despite all the recent hype around mobile payments and NFC with announcements from Orange and Barclaycard in the UK and Google Wallet launching in the US with Citi and MasterCard there is still a certain amount of skepticism. Consumer attitudes vary quite radically, depending on when they were surveyed and where they live.
Posted on 17 June 2011 by Ken Abbott
[Video] Xavier Larduinat explains how the A.T. Kearney award recognizes more than just one bright idea for a product.