Did Google Miss the Mark With Push To Make Passwords Obsolete?
On Saturday, Forbes discussed Google’s 2014 vision to make user-generated passwords obsolete. It’s an initiative that deserves praise and is long overdue. Someone is finally taking strong authentication and identity-based security seriously — particularly in the consumer space. It does, however, come with some caveats. Google is demonstrating that identity-based security solutions are available for [Read More...]
The Way Forward
The title may come across a little more literary than a normal technology or security blog, but this is what I want to discuss: the way forward in security software. Cybersecurity is a market in flux. And, from where I sit, the way forward is simple and hinges on three things. Mobile a key market [Read More...]
What is Driving Growth in the Authentication Market?
I recently read an article that pegged the global growth rate for multifactor authentication at 17 percent. This is a substantial compound annual growth rate (CAGR) when you take into consideration the size of the market and the nascent growth of some key players. Then I considered Entrust’s relative position in the market and in [Read More...]
Mobile Smart Credentials — Multipurpose Digital Identities for improved Security AND User Convenience
Today, Entrust announced the commercial release of the Entrust IdentityGuard Mobile Smart Credential — a solution that transforms a smartphone into a multipurpose digital identity.
A Framework Approach to Authentication and Identity & Access Management
Around a decade ago, I remember thinking of what it would be like if vendors kept pumping out point solutions to solve each individual problem. Luckily, that trend is not as bad as I may have thought — although I still see many vendors pushing hard for individual point solutions. Is this truly what customers [Read More...]
Layered Security for Mobile Banking
American Banker published a great article last week covering some of JPMorgan’s security strategies for mobile banking. Lloyd O’Conner explained the importance of layering multiple security technologies to protect their clients — as well as their own company — from the growing cyberthreats that not only target the online channel but are zoning in on [Read More...]
Authentication After the RSA breach: Sticking to Hard Tokens Could be a Mistake
Blogmaster Note: This was originally posted on September 20, 2011 to the ComputerWorld UK Security Blog. The role of authentication as part of the CISO’s armory has been subject to some serious debate in recent months. In the wake of the RSA data breach, and the subsequent news of customers’ compromised data, the ability of [Read More...]
No such thing as a free lunch… particularly when dealing with a security breach.
As most of you are well aware, as a remedy to try and help its customers, RSA is offering “free” tokens to replace their compromised devices. Well, they’re really not free tokens; what RSA is willing to do is provide a new token with a limited-time license based on the remaining life span of a customer’s compromised [Read More...]
Are you into BYOD?
Today’s identities go well beyond people and how we traditionally think of identities. The number of people identities will be dwarfed in the next five years by device and application identities. How is your organization planning on dealing with the consumerization of the IT infrastructure?
Entrust Webcast: Leveraging Mobile Devices for Strong Authentication
Security-conscious organizations and enterprises are finding it increasingly difficult to secure various mobile devices that flood corporate networks. With handheld devices heavily leveraged to access corporate networks and sensitive information, CIOs must consider their authentication strategies for any number of evolving channels.