Biometrics, the CIO’s challenge and how AI could finally improve mobile security

This publication once asked the question: is 2013 going to be the year of biometric security? While clearly something of an optimistic prediction, the past few years have been spent periodically lamenting the death throes of the traditional password, with seemingly minimal change.

But could we – finally – get the change the industry so desperately needs? Kevin Gilroy, executive vice president and head of Samsung Business, writes that...

By James Bourne, 31 March 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Identity, Security.

NIST report encourages “wider view” of mobile security ecosystem

(c)iStock.com/zeljkosantrac

The National Institute of Standards and Technology (NIST) has released a new resource which aims to help organisations protect their systems from mobile threats.

The paper, which is currently at a draft stage and is requesting feedback, lists potential threats in a variety of areas, from authentication to supply chains, physical access to payments, as well as network protocols and infrastructure.

“Mobile devices pose a unique set of threats, yet typical enterprise protections...

By James Bourne, 15 September 2016, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Is paying up an answer to ransomware, or a questionable choice?

(c)iStock.com/MarianVejcik

Ransomware attacks are on the rise. This “spray and pray” type of malicious software blocks access to compute systems and encrypts computer files until money is paid. This standstill approach has made ransomware a serious and costly threat to businesses today. In fact, CryptoWall reportedly brought in roughly 18 million dollars from victims between April 2014 and June 2015.

And while...

By Richard Walters, 27 July 2016, 0 comments. Categories: Authentication, Data Loss, Enterprise Mobility, Security.

Opinion: Why the death of the password is upon us

(c)iStock.com/kr7ysztof

Technology has afforded consumers terrific conveniences, and with that, consumer patience has gradually dwindled. We now expect frictionless, real-time access to information, applications and networks. In light of the emphasis on convenience and the consumer experience, the traditional password is losing its foothold as the standard in authentication.

Consumers no longer have the patience to fill out lengthy registration forms, or the free brain space to remember dozens upon dozens of usernames and...

By Patrick Salyer, 01 June 2016, 2 comments. Categories: Authentication, Security.

Microsoft toughening up password requirements – but is it too late?

(c)iStock.com/frenky362

It is an issue that has rumbled on for as long as most of us can remember – but now Microsoft aims to make the dreaded password a little bit safer by banning easy passwords.

The news comes amidst a series of data breaches; the LinkedIn data breach which hit the news last week – albeit not containing any new data from beyond the previous breach in 2012 – being chief among them. Since then however, it has emerged that hackers have stolen up to 65 million Tumblr...

By James Bourne, 31 May 2016, 1 comment. Categories: Authentication, Employees, Enterprise Mobility, Privacy, Security.

Why mobility is moving faster than the CSO

(c)iStock.com/erhui1979

The future

Alice begins her workday staring at a white wall in order to get the best resolution with her smarteye. The smarteye contact lens projects light into her retinas having the best contrast with a colourless background. Reading midway through the morning news blogs, she receives a gentle tap from her outdated smartwatch. The tap indicates her IoT coffee maker received the trending brew formula from a cyber roaster and has completed its automated task.

She brings a 3D printed...

By MobileIron, 15 January 2016, 0 comments. Categories: Applications, Authentication, Enterprise Mobility, Privacy, Security.

Globo advocates five key rules for building quality enterprise apps

(c)iStock.com/sestovic

A new whitepaper from enterprise mobility management (EMM) provider Globo offers five key tenets for building quality enterprise apps, including user-centric design, partnerships, and security concerns.

“Enterprise mobile apps are revolutionising the way we do business,” the report begins. “They are transforming the mobile employee experience and significantly improving business efficiency and workflows, and driving billions in new revenue. One thing is clear –...

By James Bourne, 30 September 2015, 1 comment. Categories: Authentication, Development, Enterprise Mobility.

The common lie of ubiquitous mobile coverage for enterprise apps

(c)iStock.com/creative-idea

I have a lot of trouble spelling ubiquitous, but it is a great word and worth the trouble – it means found everywhere. So my proposition is that the universally held truth that mobile coverage is everywhere is indeed a bold lie, but such a good lie that it is rarely challenged. The corollary of this lie is that enterprise mobile apps can be based on web technology and that their resulting dependence on coverage is not an issue.

In truth, mobile coverage has improved...

By Mary Brittain-White, 26 August 2015, 0 comments. Categories: Applications, Authentication, Enterprise Mobility, Mobile.

Appthority warns of spear phishing through Quicksand enterprise iOS vulnerability

(c)iStock.com/Onfokus

Mobile security provider Appthority has disclosed a previously unknown sandbox violation in iOS that was liable to affect enterprise users which has since been patched.

Named ‘Quicksand’, the vulnerability exploited mobile device management (MDM) clients, as well as mobile apps distributed via an MDM which use the ‘managed app configuration’ setting.

For ease of use in setting up MDM clients and apps, IT departments will normally push through the credentials...

By James Bourne, 24 August 2015, 0 comments. Categories: Authentication, Enterprise Mobility, iOS, Malware, Security.

Five ways to quickly support enterprise mobile security

(Image Credit: iStockPhoto/Peter Burnett)

All too often, implementing enterprise mobility is seen as an intimidating mammoth project, causing IT professionals to resort to patchy, expedient solutions at best or to completely ignore the call-for-mobility at worst. Security concerns and compliance constraints along with limited IT staffing and budget serve to further push back any mobility-related initiatives.

However, the demand for...

By SafeNet, 03 August 2015, 0 comments. Categories: Authentication, Enterprise Mobility, Security.

Loss of customer trust biggest downside to DDoS attack, research claims

(c)iStock.com/maxkabakov

Loss of customer trust and confidence were the key downsides to suffering a distributed denial of service (DDoS) attack, according to a new piece of research.

The study, conducted by Corero Network Security, found more than half (52%) of IT security professionals polled say their customers showed a lack of trust following an outage, while more than one in five (22%) said DDoS attacks directly impacted their bottom line.

Nearly half admitted they responded reactively rather than...

By James Bourne, 13 July 2015, 0 comments. Categories: Authentication, Malware, Security.

Why asking employees to use free Wi-Fi on the road is an expensive thing to do

(c)iStock.com/pawel_p

A new study from Rethink Technology Research, sponsored by connectivity specialists iPass, has found North American and European business travellers wasted at least £855 million in connectivity charges while travelling in 2014.

Of that £855m, almost one third (£275m) of that number came from trips within Europe, while £243m came from Europeans travelling outside of Europe, and £337m from North Americans travelling internationally.

“Our findings are...

By James Bourne, 09 July 2015, 0 comments. Categories: Authentication, Collaboration, Productivity, Research, Security.

Another enterprise app partnership? Xamarin and Oracle team up for backend integration

Picture credit: Xamarin

There’s an old saying about buses; you wait ages for one to arrive and then three come along at once. Soon enough, there may well be a similar aphorism around enterprise app partnerships. First it was Apple and IBM, then it was Red Hat and Samsung, now it is the turn of Xamarin and Oracle.

The two...

Can employees be incentivised to create stronger passwords?

(c)iStock.com/kr7ysztof

Updated Research continues to show the struggle of the password in keeping enterprise security. But is there a solution to keep employees – and employers – in shape?

In June, survey data from Centrify found that one in three admitted suffering from ‘password rage’ – one in six were so frustrated they screamed or shouted in the office, while one in seven admit they tear a strip off...

By James Bourne, 02 July 2015, 1 comment. Categories: Authentication, Employee Education, Employees, Security.

AirWatch announces version 8 with biometric authentication, Chrome OS integration and more

Picture credit: AirWatch by VMware

Atlanta-based enterprise mobility management (EMM) provider AirWatch by VMware has announced the launch of AirWatch 8.0, the largest platform expansion since the company was bought out by VMware.

The release has been timed to coincide with the first anniversary of VMware’s acquisition of AirWatch, and contains a wide variety of new releases and innovations, from biometric authentication and eye scanning for identity, to integration with

By James Bourne, 24 February 2015, 0 comments. Categories: Authentication, Enterprise Mobility, IoT, Security.

Mac OS X and iOS most vulnerable operating systems in 2014, according to GFI

(c)iStock.com/pressureUA

It’s good news and bad news for Microsoft, according to the latest figures from network and security solutions provider GFI. While Windows was no longer the most vulnerable operating system in 2014, Internet Explorer remains by a distance the most insecure application.

The figures, which were taken from the National Vulnerability Database (NVD), found Apple Mac and iOS as the most dangerous operating systems for vulnerabilities with 147 and 127 separate incidents reported in...

By James Bourne, 23 February 2015, 0 comments. Categories: Authentication, Malware, Security.

Microsoft confirms biometric authentication for Windows 10: Is the end of the password nigh?

(c)iStock.com/tumpikuja

Microsoft has announced that FIDO (Fast Identity Online) support will be coming to Windows 10, offering stronger password-less authentication for users.

The tech giant, which joined the FIDO Alliance in late 2013, noted in a blog post how FIDO will integrate with Windows 10 sign-in, Azure Active Directory, as well as various enterprise services, such as Office 365 Exchange Online, Salesforce, Citrix, and Box.

“FIDO standards enable a universal framework that a global ecosystem delivers for a...

By James Bourne, 18 February 2015, 0 comments. Categories: Authentication, Microsoft, Security.

The changing face of endpoint management and its ramifications for EMM

(c)iStock.com/tumpikuja

Autotask, a company traditionally associated with IT management software, is now moving into endpoint management to further its portfolio.

The move came after the acquisition of SaaS-based platform CentraStage in September, with the New York-based company officially moving into the remote monitoring and management (RMM) space in December with the launch of Autotask Endpoint Management for managed service providers. Patrick Burns, vice president of product management at Autotask,...

By James Bourne, 17 February 2015, 0 comments. Categories: Authentication, Employee Education, Enterprise Mobility, Malware, Security.

2014 data breaches by the numbers - and their impact

(c)iStock.com/hh5800

A year ago, I was writing about the 575 million data records lost or stolen throughout 2013, a sum based on the data collected by the Breach Level Index that seemed astonishing at the time. The Target breach that happened at the end of that year stood out for me as the epitome of a changing infosec landscape, in which a breach not only caught the attention of industry experts, but also warranted weeks of mainstream media...

By SafeNet, 12 February 2015, 0 comments. Categories: Authentication, Privacy, Security.

Mobile fraud hits enterprises in the pocket to tune of $240m, report finds

(c)iStock.com/Antoniooo

New survey data from mobile identity provider TeleSign has found that enterprises have lost up to $240m (£157.3m) a year because of mobile e-commerce fraud.

The study, conducted by J. Gold Associates and sponsored by TeleSign and RSA, EMC’s security division, found average revenue loss due to mobile fraud was $92.3m per year (£60.54m).

Organisations surveyed had average revenue of $2.54bn, so this loss feels comparatively like a drop in the ocean. Yet the report also...

By James Bourne, 06 February 2015, 0 comments. Categories: Authentication, Data Loss, Security.