Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.

Lack of knowledge around biometrics apparent – but could they be coming to a workplace near you?

A new piece of research from employee software provider TSheets shows a worrying lack of knowledge around what biometric data represents – and concern over how it may be used.

The survey collated responses from 500 US residents and asked them what they thought contained biometric data. The answers offered to respondents were DNA, facial photographs, fingerprints, hand geometry, iris scan, and retina scan. Of course, participants should have selected all of those options – but 37.3% opted for...

By James Bourne, 08 February 2018, 0 comments. Categories: Authentication, Employee Education, Employees, Identity, Security.

Malicious and imitation apps continue to proliferate – so how can your organisation stay safe?

It has been a tough quarter when it comes to application security, according to RiskIQ’s latest mobile threat landscape report, with an increase in malicious apps flooding the marketplace, new mobile botnets, and imitation and trojan apps making it through official app store borders.

The report, which analysed 120 mobile app stores and more than two billion daily scanned resources, found that Google’s percentage of malicious apps fell to a low of 4% this quarter, having been at 8% in Q2. Yet this...

By James Bourne, 12 December 2017, 0 comments. Categories: Authentication, Employees, Enterprise Mobility, Research, Security.

Get on board with biometrics and your organisation will be better trusted

A majority of consumers would be more likely to trust organisations if they were to use biometrics for authentication, according to a new study from Unisys.

The study, which polled more than 3,500 consumers across seven countries in Europe, found more than two thirds (68%) would trust biometric-friendly organisations more than others. 63% of respondents believe that biometrics are more secure than traditional PIN and password methods, with 57% there adding fingerprint scanning was the most secure form of...

By James Bourne, 06 December 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Security.

Cybersecurity for digital transformation: A guide

Digital transformation is all about change, agility, connectivity and meeting today’s users’ expectations. And no matter what industry you’re in, it will play a huge role in the future of your business.

In the eyes of many, though, cybersecurity stands in the way of all this. But it’s still an essential part of your strategy. So, looking forward, you need to ensure you have robust policies in place. As well as a full understanding of cybersecurity’s role in the digital...

By Tim Isaac, 28 November 2017, 1 comment. Categories: App Platforms, Authentication, Enterprise Mobility, Security.

Gemalto’s new platform aims to safeguard enterprise data any time, anywhere

Security provider Gemalto has launched a centralised cloud-based services platform to help enterprises safeguard data, meet compliance mandates, and secure crucial information any time and from anywhere.

According to the company, SafeNet Data Protection On Demand helps resolve issues related to cost and complexity of shielding data by providing a single data security-as-a-service platform. The platform can easily integrate with the existing IT systems, DevOps tools and cloud services to protect wherever data...

By Enterprise CIO, 06 November 2017, 0 comments. Categories: Authentication, Identity, IoT, Security.

One in four companies only use passwords as BYOD defence, research finds

Here’s a worrying security statistic in research released today by Bitglass: one quarter of organisations use passwords only for BYOD security.

The research, which took its cue from more than 200 IT and security professionals surveyed at a recent Gartner conference, found that external sharing was the leading cloud security concern for those polled, cited by 45%. Other security scares include malware protection (40%) and unmanaged device access (40%).

For those who do use multi-factor authentication to...

By James Bourne, 02 November 2017, 0 comments. Categories: Authentication, BYOD, Identity, Privacy, Security.

Security pros unsure on facial recognition with fingerprints on top, survey finds

Apple’s shiny new iPhone X will include ‘Face ID’ biometrics – but security practitioners appear to have their doubts over the technology’s perceived benefits.

Cloud security software provider Bitglass polled 129 attendees at the Black Hat conference in Las Vegas in July and found that for one in five (19.4%) respondents, facial recognition was considered the least effective security tool, only ahead of password-protected documents (33.3%).

Fingerprints – cited by 3.1% -...

By James Bourne, 19 September 2017, 0 comments. Categories: Authentication, BYOD, Enterprise Mobility, Security.

EyeLock enters into licence agreement with Qualcomm for mobile security suite

EyeLock, an iris-based identity authentication technology provider, has entered into a licence agreement with Qualcomm Technologies for Qualcomm Mobile Security.

The company, a subsidiary of VOXX International Corporation, is developing iris authentication solutions that are designed to work with Qualcomm’s Mobile Security suite, and to benefit OEMs across the entire IoT spectrum from one of the secured iris authentication implementations available in the market.

The Qualcomm Mobile Security is...

By Enterprise CIO, 04 August 2017, 0 comments. Categories: Authentication, Identity, Security.

Biometrics, the CIO’s challenge and how AI could finally improve mobile security

This publication once asked the question: is 2013 going to be the year of biometric security? While clearly something of an optimistic prediction, the past few years have been spent periodically lamenting the death throes of the traditional password, with seemingly minimal change.

But could we – finally – get the change the industry so desperately needs? Kevin Gilroy, executive vice president and head of Samsung Business, writes that...

By James Bourne, 31 March 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Identity, Security.