Biometrics, the CIO’s challenge and how AI could finally improve mobile security

This publication once asked the question: is 2013 going to be the year of biometric security? While clearly something of an optimistic prediction, the past few years have been spent periodically lamenting the death throes of the traditional password, with seemingly minimal change.

But could we – finally – get the change the industry so desperately needs? Kevin Gilroy, executive vice president and head of Samsung Business, writes that...

By James Bourne, 31 March 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Identity, Security.

NIST report encourages “wider view” of mobile security ecosystem

(c)iStock.com/zeljkosantrac

The National Institute of Standards and Technology (NIST) has released a new resource which aims to help organisations protect their systems from mobile threats.

The paper, which is currently at a draft stage and is requesting feedback, lists potential threats in a variety of areas, from authentication to supply chains, physical access to payments, as well as network protocols and infrastructure.

“Mobile devices pose a unique set of threats, yet typical enterprise protections...

By James Bourne, 15 September 2016, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Is paying up an answer to ransomware, or a questionable choice?

(c)iStock.com/MarianVejcik

Ransomware attacks are on the rise. This “spray and pray” type of malicious software blocks access to compute systems and encrypts computer files until money is paid. This standstill approach has made ransomware a serious and costly threat to businesses today. In fact, CryptoWall reportedly brought in roughly 18 million dollars from victims between April 2014 and June 2015.

And while...

By Richard Walters, 27 July 2016, 0 comments. Categories: Authentication, Data Loss, Enterprise Mobility, Security.

Why impending SHA-1 deadlines are impacting your business

(c)iStock.com/Matej Moderc

The cyber security industry, audit organisations, technical experts, browser manufacturers, Microsoft, and standards organisationsagree: SHA-1 signed certificates need to be replaced.

This resource from Venafi outlines what needs to change, why it needs to change, and what this means for your business.

By James Bourne, 06 July 2016, 0 comments. Categories: Authentication, Security.

How to successfully migrate from SHA-1 to SHA-2 encryption

Leading browsers are showing security warnings for sites that use SHA-1 based certificates that expire after January 1 2017, while code signed using SHA-1 from 2016 will no longer be trusted by Microsoft on the same date.

If your organisation hasn’t already migrated both internal and external SHA-1 certificates to SHA-2, it’s time to start .

This whitepaper from Venafi outlines a comprehensive seven step migration plan to help protect your business and your brand.

By James Bourne, 06 July 2016, 0 comments. Categories: Authentication, Security.

Opinion: Why the death of the password is upon us

(c)iStock.com/kr7ysztof

Technology has afforded consumers terrific conveniences, and with that, consumer patience has gradually dwindled. We now expect frictionless, real-time access to information, applications and networks. In light of the emphasis on convenience and the consumer experience, the traditional password is losing its foothold as the standard in authentication.

Consumers no longer have the patience to fill out lengthy registration forms, or the free brain space to remember dozens upon dozens of usernames and...

By Patrick Salyer, 01 June 2016, 2 comments. Categories: Authentication, Security.

Microsoft toughening up password requirements – but is it too late?

(c)iStock.com/frenky362

It is an issue that has rumbled on for as long as most of us can remember – but now Microsoft aims to make the dreaded password a little bit safer by banning easy passwords.

The news comes amidst a series of data breaches; the LinkedIn data breach which hit the news last week – albeit not containing any new data from beyond the previous breach in 2012 – being chief among them. Since then however, it has emerged that hackers have stolen up to 65 million Tumblr...

By James Bourne, 31 May 2016, 1 comment. Categories: Authentication, Employees, Enterprise Mobility, Privacy, Security.

Why mobility is moving faster than the CSO

(c)iStock.com/erhui1979

The future

Alice begins her workday staring at a white wall in order to get the best resolution with her smarteye. The smarteye contact lens projects light into her retinas having the best contrast with a colourless background. Reading midway through the morning news blogs, she receives a gentle tap from her outdated smartwatch. The tap indicates her IoT coffee maker received the trending brew formula from a cyber roaster and has completed its automated task.

She brings a 3D printed...

By MobileIron, 15 January 2016, 0 comments. Categories: Applications, Authentication, Enterprise Mobility, Privacy, Security.

Globo advocates five key rules for building quality enterprise apps

(c)iStock.com/sestovic

A new whitepaper from enterprise mobility management (EMM) provider Globo offers five key tenets for building quality enterprise apps, including user-centric design, partnerships, and security concerns.

“Enterprise mobile apps are revolutionising the way we do business,” the report begins. “They are transforming the mobile employee experience and significantly improving business efficiency and workflows, and driving billions in new revenue. One thing is clear –...

By James Bourne, 30 September 2015, 1 comment. Categories: Authentication, Development, Enterprise Mobility.

The common lie of ubiquitous mobile coverage for enterprise apps

(c)iStock.com/creative-idea

I have a lot of trouble spelling ubiquitous, but it is a great word and worth the trouble – it means found everywhere. So my proposition is that the universally held truth that mobile coverage is everywhere is indeed a bold lie, but such a good lie that it is rarely challenged. The corollary of this lie is that enterprise mobile apps can be based on web technology and that their resulting dependence on coverage is not an issue.

In truth, mobile coverage has improved...

By Mary Brittain-White, 26 August 2015, 0 comments. Categories: Applications, Authentication, Enterprise Mobility, Mobile.