Hyperledger and Enterprise Ethereum Alliance team up to push forward enterprise blockchain

If blockchain technologies are going to seriously infiltrate the enterprise, then an endorsement from two leading industry players would not go amiss. The Enterprise Ethereum Alliance (EEA) has teamed up with Hyperledger to seemingly do just that.

The two bodies are chumming up by becoming associate members within each other’s organisations. This is somewhat interesting in itself; the EEA naturally aims to focus on...

By James Bourne, 02 October 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

How AI and machine learning can help detect and fight against cyberattacks

New research conducted by the Ponemon Institute argues that IT security teams need both a new approach and powerful new tools to protect data and other high-value assets, as companies struggle to fight against sophisticated cybersecurity attacks.

For this study, conducted on behalf of Aruba, a total of 4,000 security and IT professionals across the Americas, Europe and Asia were surveyed to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are required to...

By Enterprise CIO, 20 September 2018, 0 comments. Categories: Applications, Authentication, Data & Analytics, Security.

How Disney's ‘guestology’ theory for customer experience can improve IT support

It has been a few years now since Bruce Laval first coined the phrase ‘guestology’ for The Walt Disney corporation as a philosophy of how to maintain the ‘magic’ of the Walt Disney World resort.

A key factor of the theory is that what appears in front of the customer is always the finished product – all the characters and themes always in the right place and never seen in an area they should not be...

By Anthony Lamoureux, 17 August 2018, 0 comments. Categories: Authentication, Cloud , Employees.

Forget facial recognition: Let’s use AI to help gauge integrity

We’re hearing about more and more applications of AI-driven facial recognition systems, from checking identities at the airport to verifying board members for meetings. Taking things a step further, The Times reported recently that the Chinese city of Xinjiang has given its law enforcement officers Google Glass-like headsets equipped with facial...

By David Fulton, 06 June 2018, 0 comments. Categories: Authentication, Identity, Security.

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password should be at a minimum 8...

By Ojas Rege, 03 May 2018, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Bitcoin, blockchain and network security: A guide

The wild swings in the value of Bitcoin have been widely reported over the last few months drawing broad public attention to the cryptocurrency previously known mostly in cyber-world. Reports of players getting rich overnight buying and trading Bitcoin have blanketed the internet. Other reports of 50% overnight swings in Bitcoin value have also drawn much attention. Here are a few thoughts on the sudden rise in popularity of cryptocurrencies, the underlying technology and the risks to the players.

I use the...

By Alastair Hartrup, 10 April 2018, 0 comments. Categories: App Platforms, Authentication, Data & Analytics, Security.

Lack of knowledge around biometrics apparent – but could they be coming to a workplace near you?

A new piece of research from employee software provider TSheets shows a worrying lack of knowledge around what biometric data represents – and concern over how it may be used.

The survey collated responses from 500 US residents and asked them what they thought contained biometric data. The answers offered to respondents were DNA, facial photographs, fingerprints, hand geometry, iris scan, and retina scan. Of course, participants should have selected all of those options – but 37.3% opted for...

By James Bourne, 08 February 2018, 0 comments. Categories: Authentication, Employee Education, Employees, Identity, Security.

Malicious and imitation apps continue to proliferate – so how can your organisation stay safe?

It has been a tough quarter when it comes to application security, according to RiskIQ’s latest mobile threat landscape report, with an increase in malicious apps flooding the marketplace, new mobile botnets, and imitation and trojan apps making it through official app store borders.

The report, which analysed 120 mobile app stores and more than two billion daily scanned resources, found that Google’s percentage of malicious apps fell to a low of 4% this quarter, having been at 8% in Q2. Yet this...

By James Bourne, 12 December 2017, 0 comments. Categories: Authentication, Employees, Enterprise Mobility, Research, Security.

Get on board with biometrics and your organisation will be better trusted

A majority of consumers would be more likely to trust organisations if they were to use biometrics for authentication, according to a new study from Unisys.

The study, which polled more than 3,500 consumers across seven countries in Europe, found more than two thirds (68%) would trust biometric-friendly organisations more than others. 63% of respondents believe that biometrics are more secure than traditional PIN and password methods, with 57% there adding fingerprint scanning was the most secure form of...

By James Bourne, 06 December 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Security.

Cybersecurity for digital transformation: A guide

Digital transformation is all about change, agility, connectivity and meeting today’s users’ expectations. And no matter what industry you’re in, it will play a huge role in the future of your business.

In the eyes of many, though, cybersecurity stands in the way of all this. But it’s still an essential part of your strategy. So, looking forward, you need to ensure you have robust policies in place. As well as a full understanding of cybersecurity’s role in the digital...

By Tim Isaac, 28 November 2017, 1 comment. Categories: App Platforms, Authentication, Enterprise Mobility, Security.

Gemalto’s new platform aims to safeguard enterprise data any time, anywhere

Security provider Gemalto has launched a centralised cloud-based services platform to help enterprises safeguard data, meet compliance mandates, and secure crucial information any time and from anywhere.

According to the company, SafeNet Data Protection On Demand helps resolve issues related to cost and complexity of shielding data by providing a single data security-as-a-service platform. The platform can easily integrate with the existing IT systems, DevOps tools and cloud services to protect wherever data...

By Enterprise CIO, 06 November 2017, 0 comments. Categories: Authentication, Identity, IoT, Security.

One in four companies only use passwords as BYOD defence, research finds

Here’s a worrying security statistic in research released today by Bitglass: one quarter of organisations use passwords only for BYOD security.

The research, which took its cue from more than 200 IT and security professionals surveyed at a recent Gartner conference, found that external sharing was the leading cloud security concern for those polled, cited by 45%. Other security scares include malware protection (40%) and unmanaged device access (40%).

For those who do use multi-factor authentication to...

By James Bourne, 02 November 2017, 0 comments. Categories: Authentication, BYOD, Identity, Privacy, Security.

Security pros unsure on facial recognition with fingerprints on top, survey finds

Apple’s shiny new iPhone X will include ‘Face ID’ biometrics – but security practitioners appear to have their doubts over the technology’s perceived benefits.

Cloud security software provider Bitglass polled 129 attendees at the Black Hat conference in Las Vegas in July and found that for one in five (19.4%) respondents, facial recognition was considered the least effective security tool, only ahead of password-protected documents (33.3%).

Fingerprints – cited by 3.1% -...

By James Bourne, 19 September 2017, 0 comments. Categories: Authentication, BYOD, Enterprise Mobility, Security.

EyeLock enters into licence agreement with Qualcomm for mobile security suite

EyeLock, an iris-based identity authentication technology provider, has entered into a licence agreement with Qualcomm Technologies for Qualcomm Mobile Security.

The company, a subsidiary of VOXX International Corporation, is developing iris authentication solutions that are designed to work with Qualcomm’s Mobile Security suite, and to benefit OEMs across the entire IoT spectrum from one of the secured iris authentication implementations available in the market.

The Qualcomm Mobile Security is...

By Enterprise CIO, 04 August 2017, 0 comments. Categories: Authentication, Identity, Security.

Biometrics, the CIO’s challenge and how AI could finally improve mobile security

This publication once asked the question: is 2013 going to be the year of biometric security? While clearly something of an optimistic prediction, the past few years have been spent periodically lamenting the death throes of the traditional password, with seemingly minimal change.

But could we – finally – get the change the industry so desperately needs? Kevin Gilroy, executive vice president and head of Samsung Business, writes that...

By James Bourne, 31 March 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Identity, Security.

NIST report encourages “wider view” of mobile security ecosystem

(c)iStock.com/zeljkosantrac

The National Institute of Standards and Technology (NIST) has released a new resource which aims to help organisations protect their systems from mobile threats.

The paper, which is currently at a draft stage and is requesting feedback, lists potential threats in a variety of areas, from authentication to supply chains, physical access to payments, as well as network protocols and infrastructure.

“Mobile devices pose a unique set of threats, yet typical enterprise protections...

By James Bourne, 15 September 2016, 0 comments. Categories: Authentication, Data & Analytics, Data Loss, Enterprise Mobility, Security.

Is paying up an answer to ransomware, or a questionable choice?

(c)iStock.com/MarianVejcik

Ransomware attacks are on the rise. This “spray and pray” type of malicious software blocks access to compute systems and encrypts computer files until money is paid. This standstill approach has made ransomware a serious and costly threat to businesses today. In fact, CryptoWall reportedly brought in roughly 18 million dollars from victims between April 2014 and June 2015.

And while...

By Richard Walters, 27 July 2016, 0 comments. Categories: Authentication, Data Loss, Enterprise Mobility, Security.

Opinion: Why the death of the password is upon us

(c)iStock.com/kr7ysztof

Technology has afforded consumers terrific conveniences, and with that, consumer patience has gradually dwindled. We now expect frictionless, real-time access to information, applications and networks. In light of the emphasis on convenience and the consumer experience, the traditional password is losing its foothold as the standard in authentication.

Consumers no longer have the patience to fill out lengthy registration forms, or the free brain space to remember dozens upon dozens of usernames and...

By Patrick Salyer, 01 June 2016, 2 comments. Categories: Authentication, Security.

Microsoft toughening up password requirements – but is it too late?

(c)iStock.com/frenky362

It is an issue that has rumbled on for as long as most of us can remember – but now Microsoft aims to make the dreaded password a little bit safer by banning easy passwords.

The news comes amidst a series of data breaches; the LinkedIn data breach which hit the news last week – albeit not containing any new data from beyond the previous breach in 2012 – being chief among them. Since then however, it has emerged that hackers have stolen up to 65 million Tumblr...

By James Bourne, 31 May 2016, 1 comment. Categories: Authentication, Employees, Enterprise Mobility, Privacy, Security.