Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally aims to focus on...

By James Bourne, 02 October 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

How Disney's ‘guestology’ theory for customer experience can improve IT support

It has been a few years now since Bruce Laval first coined the phrase ‘guestology’ for The Walt Disney corporation as a philosophy of how to maintain the ‘magic’ of the Walt Disney World resort.

A key factor of the theory is that what appears in front of the customer is always the finished product – all the characters and themes always in the right place and never seen in an area they should not be...

By Anthony Lamoureux, 17 August 2018, 0 comments. Categories: Authentication, Cloud , Employees.

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial...

By David Fulton, 06 June 2018, 0 comments. Categories: Authentication, Identity, Security.

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password should be at a minimum 8...

By Ojas Rege, 03 May 2018, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.

Lack of knowledge around biometrics apparent – but could they be coming to a workplace near you?

A new piece of research from employee software provider TSheets shows a worrying lack of knowledge around what biometric data represents – and concern over how it may be used.

The survey collated responses from 500 US residents and asked them what they thought contained biometric data. The answers offered to respondents were DNA, facial photographs, fingerprints, hand geometry, iris scan, and retina scan. Of course, participants should have selected all of those options – but 37.3% opted for...

By James Bourne, 08 February 2018, 0 comments. Categories: Authentication, Employee Education, Employees, Identity, Security.

Malicious and imitation apps continue to proliferate – so how can your organisation stay safe?

It has been a tough quarter when it comes to application security, according to RiskIQ’s latest mobile threat landscape report, with an increase in malicious apps flooding the marketplace, new mobile botnets, and imitation and trojan apps making it through official app store borders.

The report, which analysed 120 mobile app stores and more than two billion daily scanned resources, found that Google’s percentage of malicious apps fell to a low of 4% this quarter, having been at 8% in Q2. Yet this...

By James Bourne, 12 December 2017, 0 comments. Categories: Authentication, Employees, Enterprise Mobility, Research, Security.

Get on board with biometrics and your organisation will be better trusted

A majority of consumers would be more likely to trust organisations if they were to use biometrics for authentication, according to a new study from Unisys.

The study, which polled more than 3,500 consumers across seven countries in Europe, found more than two thirds (68%) would trust biometric-friendly organisations more than others. 63% of respondents believe that biometrics are more secure than traditional PIN and password methods, with 57% there adding fingerprint scanning was the most secure form of...

By James Bourne, 06 December 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Security.