Posted on 22 September 2011 by Thales
As a follow-on to my previous post on how identity can be verified according to your footsteps, I just wanted to highlight how this could be put to effect in catching assassins and other criminals. One of the biggest TV highlights of the year, spy series Spooks (broadcast under the name MI5 for our American […]
Posted on 01 March 2012 by Thales
RSA 2012 is the biggest event in the security calendar. I’m here in San Francisco immersing myself in a buzz of activity and discussion about the latest cyber threats, data breaches, risk management and cloud security. But despite all the hustle and bustle I can’t keep away from my favourite blogs and wanted to share […]
Posted on 21 December 2012 by Thales
If you read the news as much as I do, you probably have seen a lot of advice about how to avoid having your financial details stolen this holiday season. It’s true that conducting banking transactions or shopping online does make you vulnerable to cybercriminals lurking in the background. But there are a lot of […]
Posted on 29 July 2014 by Xavier Larduinat
There are many companies that claim to secure your digital services, networks, servers and even whatever you have hosted in the cloud.
Posted on 25 September 2019 by Haider Iqbal
When it comes to granting access to confidential data at work who can really be trusted? With a Zero Trust mindset the answer should be no one at all.
Posted on 19 June 2020 by Anne Wang
We look into the importance of remote authentication during the current pandemic, and how biometrics can prove who you are when you’re at home, protecting your identity and data.