Building trust in a ‘zero trust’ environment: A more dynamic security model

Today’s working environments are no longer governed by the perimeters and boundaries they once were.  As a result, security threats have multiplied and the pressure on IT teams to protect data has increased rapidly. Modern work happens in a mobile-cloud environment outside traditional security controls, and from the perspective of those controls it’s a zero trust environment.

As attacks become more sophisticated, security professionals are forced to reconsider the best practices on which...

By Ojas Rege, 17 September 2018, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Is two-factor security no longer enough for organisations?

The news that Reddit has become the latest high-profile company to suffer a data breach raises some important security questions, particularly in relation to employees.

In this incident Reddit used SMS-based authentication, which, while still two-factor, is less secure than other methods. The SMS codes were intercepted by hackers who were then able to access some data.  

By Ojas Rege, 20 August 2018, 0 comments. Categories: Employee Education, Employees, Enterprise Mobility, Security.

It’s time to ditch the password – and start to appreciate the evolving needs of enterprises

Today, May 3, is World Password Day. It’s a ‘celebration’ to promote better password habits. We’ve long viewed the password as a critical gatekeeper to our digital identities, safeguarding our online shopping, banking, social media, sensitive data, and business communications.

But has the password had its day? Best practise recommends the use of complex passwords that include upper and lower case letters, symbols and numbers put together randomly. The password should be at a minimum 8...

By Ojas Rege, 03 May 2018, 0 comments. Categories: Authentication, CIO, Employees, Identity, Security.

Mobile mitigations for Meltdown and Spectre: A guide

Meltdown and Spectre are two critical vulnerabilities recently identified in modern processors. These vulnerabilities can allow unprivileged users to access memory belonging to other processes, including the kernel.

Much of the initial coverage of these vulnerabilities centred on desktop, server, and cloud systems, but they affect mobile devices as well. Apple, Google, Linux distributions, and Microsoft are now releasing patches to mitigate these issues.

How the exploits work

Meltdown and Spectre are hardware...

By Ojas Rege, 22 January 2018, 0 comments. Categories: App Platforms, Data Loss, Enterprise Mobility, Security.

May the force be with you: Mobile identity, security, and Windows 10 for 2016

(c)iStock.com/Brendan Hunter

Star Wars has gone from a cult-like programme to a global phenomenon. Parallel analogies can be drawn when we look at the growth of the mobile market, from house-brick sized, leather-clad devices, to well over a billion smartphones and growing.

Given the similarities between the two, it’s a useful exercise to view the mobile marketplace in 2016 through the lens of Star Wars. After all there is certainly an almighty battle taking place between legacy systems and mobile, with...

By Ojas Rege, 21 December 2015, 0 comments. Categories: Development.