Pros and cons of mobile tokens in authentication
I recently discussed the future of the online banking industry and how the FFEIC should shape its next set of guidelines to ensure the safety of both banks and their customers in the years ahead....
View ArticleIs Email our Weakest Link?
Fahmida Y. Rashid’s recent article on email being the main source of data leaks in organizations shines a light on how dependent all professionals have become on email, and how dangerous this could...
View ArticleTo BYOD or not to BYOD – A CIO headache
The next in our series of blog posts looking at the security issues affecting CIOs in the modern era focuses on the rise of personal internet devices being used at work. In fact, there’s a good chance...
View ArticleAre there limits to NFC and mobile payments?
As a regular follower, you’ll have read a post on the rise of eBanking and mobile payments in the USA. You might also have crossed the Atlantic (via social media) to see for yourself whether London is...
View ArticleBYOD: The Solution to Password Problems?
What does the Bring Your Own Device (BYOD) trend have to do with solving the password problem? It may actually be the solution. In fact, the solution is probably already in the hands of your...
View Article
More Pages to Explore .....