Blog Posts 1-10 of 14
A Platform Approach to Authentication. . . ‘cause you just can’t keep changing things out!
Last week I was pretty proud of myself when I came up with the term “Breach Speed” (See: “When things are moving just a little too quickly . . . the whirlwind of data breaches” ); and I know my colleagues have had to live with me being a little more insufferable than usual , [Read More...]
I would be just as keen if the 5th Mobile Banking Summit was in Fargo. Honestly!
For the past week or so I’ve posted a few things to the Enterprise Authentication blog (as an example, see: Finally – I can bring my iPad to work) – but amongst us Auth & Fraud people that’s kind of like a fighter pilot flying a cargo plane. . . it’s not that hard, but [Read More...]
A graphic example of Mobile productivity. . . uhmm, sorry about the pun!
A couple of days ago I wrote a little piece on the growth of mobile devices in the enterprise, and then tied it to the release of Entrust identityGuard 10 – in a little bit of shameless corporate promotion. But hey, I’m in marketing and I get well compensated for doing just that! I had [Read More...]
Finally – I can bring my iPad to work!
I’m going to throw a bunch of statistics at you, because I think statistics provide instant street-cred (at least until you drill below the surface a little bit) and, by extension, I think that marketing people sometimes need some street cred. So here we go:
- 21% of companies have no restrictions on the use of personal devices – while 58% have lightweight policies and only 20% have stringent guideline – this I got from a USA Today article;
- 40% of organizations responding to a recent McAfee survey reported mobile devices lost or stolen often involve the loss of critical business data
- More than 50% of large enterprises expect to purchase tablets for employees over the next year – from Morgan Stanley
- 50% of firms have embraced a mobile platform strategy
- 60% of firms provide some support to personal devices (Forrester Fall 2010)
- 56% of enterprises allow personally owned smart phones to access company resources
- 16% of CIOs and IT leaders see mobility as a critical priority and 46% see it as a high priority (Forrester September 2010)
- 75% of organizations deploy mobile applications to increase worker productivity, and 65% to increase worker responsiveness
- 61% of enterprises will deploy 2FA mobile devices to their executives within 12 months, 59% to field service employees and 58% to their sales force (Forrester Technology Adoption Profile commissioned for Entrust)
Enterprise Data Breaches. . . or why I’m really not cheating on you!
I’ve decided to branch out. Now folks, don’t go getting jealous – I’m still here for all of you who’ve come to appreciate my thoughtful, articulate and witty insight around issues tied to authentication and fraud detection – ok, I guess I’m laying it on a bit thick eh?! But anyway, I just posted a blog today on [Read More...]
When things are moving just a bit too quickly. . . the whirlwind of data breaches!
I’ve just coined a new term – at least I think I can take credit for it – and remember, you heard it here first: “Breach Speed” . I derived it from the dramatic speed at which data breaches are occurring. Borrowing from the Urban Dictionary, I’d see it something like this: Breach Speed: A [Read More...]
Protecting My Business and Personal Online Identity. . . or, how Meg Ryan could be my downfall!
I thought this was an interesting story: “Webmail gets hacked, corporate passwords exposed”, and one that ought to be read by executives in many companies – the folks who can actually change behavior that could otherwise jeopardize corporate security. But it’s also a story that is highly relevant to consumers because they – “we” – [Read More...]
Embedded Security for Mobile Applications . . . Way Cool!
I’m going to start this blog off by sounding like a corporate hack! Ok, I know, as a marketing person, I’m supposed to be kind of a corporate hack; but I don’t generally act like one, I certainly don’t dress like one, and I try not to sound like one. But today Entrust dropped a [Read More...]
When it comes to me and Jude, I’m pretty sure I’d be willing to sacrifice a little security!
So, Facebook has introduced what they term two-factor authentication to the social networking site! I read a response from someone working for a large security company who said the company (I clicked on their handle and it linked me to Symantec) “commends Facebook for broadening security options. . .” . To me, this is similar [Read More...]
If you’re going to tether – make sure you know who you’re tethering with!
Most of the items that I’ve written here have dealt with the consumer space – online banking and the like – as has the one piece written by my colleague Mike (yup, that was a little dig at my good friend Mike). But many of the same threats that target online consumers, retail banking customers [Read More...]