Tag: Security

Government & Healthcare Topics Ahead as Gemalto Heads to Government…

This week, Gemalto is heading to Washington, DC for the Smart Card Alliance’s annual government conference.  We will be blogging from the event and after, as there is sure to be a lot of news regarding some of the most pressing topics in government, healthcare and trusted IDs on the Internet. Some of the topics […]

Internet economics – transforming payments is key to future growth

The internet will only get bigger and better. Or, that’s an impression you get from reading some of the reports compiled by the likes of Boston Consulting Group, McKinsey and any of the organizations looking at the impact of the Internet on our future economies. These reports are looking at the future of our economies, […]

The office of the past, present and future – part…

Today’s technology doesn’t only help us do our day jobs faster and more knowledgably, it also speeds up the admin tasks that keep every good office operating well. Many workers can now do the majority of admin tasks themselves, eliminating the need for hoards of assistants and secretaries who were previously required to do everything […]

Facebook is 10 today – how much has changed since…

As Facebook turned ten years old today, it occurred to me that one out of every six people on the planet now has a Facebook profile. Facebook is now reported to have more than 1.2 billion users out of the world’s 7.2 billion people. This achievement is stunning, particularly when one considers that this ‘social […]

How secure is NFC?

I’m occasionally asked: ‘Aren’t NFC payments vulnerable to hacking?” and “What if your NFC phone or card is stolen? Can’t someone just run off spending your money?” My answers are simple. Firstly, anything is vulnerable to hacking if it isn’t secured properly (even smart toilets); just make sure your NFC payment method is secured by […]

The Myth of the “Strong” Password

Which password do you think is easier for a hacker to crack – “Th3r3 can only b3 #1!” or “Hammered asinine requirements”? According to some new research from Carnegie Mellon University’s Institute for Software Research, it’s actually the former that is the weaker password.  Why?  Because the password “Th3r3 can only b3 #1!” has grammatical […]