Opinion: Why the death of the password is upon us


Technology has afforded consumers terrific conveniences, and with that, consumer patience has gradually dwindled. We now expect frictionless, real-time access to information, applications and networks. In light of the emphasis on convenience and the consumer experience, the traditional password is losing its foothold as the standard in authentication.

Consumers no longer have the patience to fill out lengthy registration forms, or the free brain space to remember dozens upon dozens of usernames and...

By Patrick Salyer, 01 June 2016, 2 comments. Categories: Authentication, Security.

Microsoft toughening up password requirements – but is it too late?


It is an issue that has rumbled on for as long as most of us can remember – but now Microsoft aims to make the dreaded password a little bit safer by banning easy passwords.

The news comes amidst a series of data breaches; the LinkedIn data breach which hit the news last week – albeit not containing any new data from beyond the previous breach in 2012 – being chief among them. Since then however, it has emerged that hackers have stolen up to 65 million Tumblr...

By James Bourne, 31 May 2016, 1 comment. Categories: Authentication, Employees, Enterprise Mobility, Privacy, Security.

Why mobility is moving faster than the CSO


The future

Alice begins her workday staring at a white wall in order to get the best resolution with her smarteye. The smarteye contact lens projects light into her retinas having the best contrast with a colourless background. Reading midway through the morning news blogs, she receives a gentle tap from her outdated smartwatch. The tap indicates her IoT coffee maker received the trending brew formula from a cyber roaster and has completed its automated task.

She brings a 3D printed...

By MobileIron, 15 January 2016, 0 comments. Categories: Applications, Authentication, Enterprise Mobility, Privacy, Security.

Globo advocates five key rules for building quality enterprise apps


A new whitepaper from enterprise mobility management (EMM) provider Globo offers five key tenets for building quality enterprise apps, including user-centric design, partnerships, and security concerns.

“Enterprise mobile apps are revolutionising the way we do business,” the report begins. “They are transforming the mobile employee experience and significantly improving business efficiency and workflows, and driving billions in new revenue. One thing is clear –...

By James Bourne, 30 September 2015, 1 comment. Categories: Authentication, Development, Enterprise Mobility.

The common lie of ubiquitous mobile coverage for enterprise apps


I have a lot of trouble spelling ubiquitous, but it is a great word and worth the trouble – it means found everywhere. So my proposition is that the universally held truth that mobile coverage is everywhere is indeed a bold lie, but such a good lie that it is rarely challenged. The corollary of this lie is that enterprise mobile apps can be based on web technology and that their resulting dependence on coverage is not an issue.

In truth, mobile coverage has improved...

By Mary Brittain-White, 26 August 2015, 0 comments. Categories: Applications, Authentication, Enterprise Mobility, Mobile.

Appthority warns of spear phishing through Quicksand enterprise iOS vulnerability


Mobile security provider Appthority has disclosed a previously unknown sandbox violation in iOS that was liable to affect enterprise users which has since been patched.

Named ‘Quicksand’, the vulnerability exploited mobile device management (MDM) clients, as well as mobile apps distributed via an MDM which use the ‘managed app configuration’ setting.

For ease of use in setting up MDM clients and apps, IT departments will normally push through the credentials...

By James Bourne, 24 August 2015, 0 comments. Categories: Authentication, Enterprise Mobility, iOS, Malware, Security.

Five ways to quickly support enterprise mobile security

(Image Credit: iStockPhoto/Peter Burnett)

All too often, implementing enterprise mobility is seen as an intimidating mammoth project, causing IT professionals to resort to patchy, expedient solutions at best or to completely ignore the call-for-mobility at worst. Security concerns and compliance constraints along with limited IT staffing and budget serve to further push back any mobility-related initiatives.

However, the demand for...

By SafeNet, 03 August 2015, 0 comments. Categories: Authentication, Enterprise Mobility, Security.

Loss of customer trust biggest downside to DDoS attack, research claims


Loss of customer trust and confidence were the key downsides to suffering a distributed denial of service (DDoS) attack, according to a new piece of research.

The study, conducted by Corero Network Security, found more than half (52%) of IT security professionals polled say their customers showed a lack of trust following an outage, while more than one in five (22%) said DDoS attacks directly impacted their bottom line.

Nearly half admitted they responded reactively rather than...

By James Bourne, 13 July 2015, 0 comments. Categories: Authentication, Malware, Security.

Why asking employees to use free Wi-Fi on the road is an expensive thing to do


A new study from Rethink Technology Research, sponsored by connectivity specialists iPass, has found North American and European business travellers wasted at least £855 million in connectivity charges while travelling in 2014.

Of that £855m, almost one third (£275m) of that number came from trips within Europe, while £243m came from Europeans travelling outside of Europe, and £337m from North Americans travelling internationally.

“Our findings are...

By James Bourne, 09 July 2015, 0 comments. Categories: Authentication, Collaboration, Productivity, Research, Security.

Another enterprise app partnership? Xamarin and Oracle team up for backend integration

Picture credit: Xamarin

There’s an old saying about buses; you wait ages for one to arrive and then three come along at once. Soon enough, there may well be a similar aphorism around enterprise app partnerships. First it was Apple and IBM, then it was Red Hat and Samsung, now it is the turn of Xamarin and Oracle.

The two...

Can employees be incentivised to create stronger passwords?


Updated Research continues to show the struggle of the password in keeping enterprise security. But is there a solution to keep employees – and employers – in shape?

In June, survey data from Centrify found that one in three admitted suffering from ‘password rage’ – one in six were so frustrated they screamed or shouted in the office, while one in seven admit they tear a strip off...

By James Bourne, 02 July 2015, 1 comment. Categories: Authentication, Employee Education, Employees, Security.

AirWatch announces version 8 with biometric authentication, Chrome OS integration and more

Picture credit: AirWatch by VMware

Atlanta-based enterprise mobility management (EMM) provider AirWatch by VMware has announced the launch of AirWatch 8.0, the largest platform expansion since the company was bought out by VMware.

The release has been timed to coincide with the first anniversary of VMware’s acquisition of AirWatch, and contains a wide variety of new releases and innovations, from biometric authentication and eye scanning for identity, to integration with

By James Bourne, 24 February 2015, 0 comments. Categories: Authentication, Enterprise Mobility, IoT, Security.

Mac OS X and iOS most vulnerable operating systems in 2014, according to GFI


It’s good news and bad news for Microsoft, according to the latest figures from network and security solutions provider GFI. While Windows was no longer the most vulnerable operating system in 2014, Internet Explorer remains by a distance the most insecure application.

The figures, which were taken from the National Vulnerability Database (NVD), found Apple Mac and iOS as the most dangerous operating systems for vulnerabilities with 147 and 127 separate incidents reported in...

By James Bourne, 23 February 2015, 0 comments. Categories: Authentication, Malware, Security.

Microsoft confirms biometric authentication for Windows 10: Is the end of the password nigh?


Microsoft has announced that FIDO (Fast Identity Online) support will be coming to Windows 10, offering stronger password-less authentication for users.

The tech giant, which joined the FIDO Alliance in late 2013, noted in a blog post how FIDO will integrate with Windows 10 sign-in, Azure Active Directory, as well as various enterprise services, such as Office 365 Exchange Online, Salesforce, Citrix, and Box.

“FIDO standards enable a universal framework that a global ecosystem delivers for a...

By James Bourne, 18 February 2015, 0 comments. Categories: Authentication, Microsoft, Security.

The changing face of endpoint management and its ramifications for EMM


Autotask, a company traditionally associated with IT management software, is now moving into endpoint management to further its portfolio.

The move came after the acquisition of SaaS-based platform CentraStage in September, with the New York-based company officially moving into the remote monitoring and management (RMM) space in December with the launch of Autotask Endpoint Management for managed service providers. Patrick Burns, vice president of product management at Autotask,...

By James Bourne, 17 February 2015, 0 comments. Categories: Authentication, Employee Education, Enterprise Mobility, Malware, Security.

2014 data breaches by the numbers - and their impact


A year ago, I was writing about the 575 million data records lost or stolen throughout 2013, a sum based on the data collected by the Breach Level Index that seemed astonishing at the time. The Target breach that happened at the end of that year stood out for me as the epitome of a changing infosec landscape, in which a breach not only caught the attention of industry experts, but also warranted weeks of mainstream media...

By SafeNet, 12 February 2015, 0 comments. Categories: Authentication, Privacy, Security.

Mobile exec argues need to be ‘proactive’ to take advantage of shadow IT


Wayne Byrne, director of product marketing at cloud solutions provider KeyedIn, claims a shadow IT strategy could “unlock numerous opportunities” when done correctly.

This news could strike fear into the heart of any CIO, worried that employees were using personal devices and insecure unapproved cloud software to share files and collaborate on documents.

Yet Byrne believes a good shadow IT policy can result in improved visibility, increased productivity and better mobile...

By James Bourne, 06 February 2015, 1 comment. Categories: Authentication, Cloud , Collaboration, Enterprise Mobility, Security.

Mobile fraud hits enterprises in the pocket to tune of $240m, report finds


New survey data from mobile identity provider TeleSign has found that enterprises have lost up to $240m (£157.3m) a year because of mobile e-commerce fraud.

The study, conducted by J. Gold Associates and sponsored by TeleSign and RSA, EMC’s security division, found average revenue loss due to mobile fraud was $92.3m per year (£60.54m).

Organisations surveyed had average revenue of $2.54bn, so this loss feels comparatively like a drop in the ocean. Yet the report also...

By James Bourne, 06 February 2015, 0 comments. Categories: Authentication, Data Loss, Security.

Arbor Networks study shows rate of DDoS attack increase in past 10 years


Distributed denial of service (DDoS) attacks are growing in size, complexity and frequency, according to the latest Annual Infrastructure Report from Arbor Networks.

In 2004, the largest DDoS attack was 8Gbps. Now, it’s reached 400Gbps, with other reported events at 300, 200 and 170Gbps in 2014, according to the report. 2013’s peak was 245Gbps. 38% of survey respondents said they had seen more than 21 attacks per month this year, up significantly from just over a quarter in...

By James Bourne, 28 January 2015, 0 comments. Categories: Authentication, Data Loss, Security.

Business data breaches get more expensive each year: The state of enterprise security


The average cost of a data breach per company has almost doubled in five years, from $6.46m in 2010 to $12.69m in 2014, according to a new infographic put together by SysCloud.

More than a quarter (26.1%) of these breaches are as a result of hacking incidents, while 11.7% are down to insider theft – such as employees selling their company passwords to the highest bidder, as Enterprise...

By James Bourne, 28 January 2015, 0 comments. Categories: Authentication, Data Loss, Infographic, Security.