Entrust at RSA: Secure Mobile is the New Enterprise Desktop
This entry is part 9 of 12 in the series Entrust at RSA 2014 It may sound like a quote from the classic ‘90s sitcom Seinfeld, but worlds are definitely colliding. As the evolution of identities, mobility, cloud/apps and malware gain momentum, the collision course has never been more apparent than the present. The only [Read More...]
Mobile Malware — Will it Expand in 2014?
This comes as no surprise, but the bring-your-own-device (BYOD) movement has reached critical mass. More and more enterprises are leveraging mobile to share information, complete transaction or increase business efficiency. In fact, 67 percent of organizations use personal devices at work, and 42 percent of companies surveyed now allow BYOD at the enterprise level. Unfortunately, [Read More...]
iPhone 5s Gains Biometric Authentication via ‘Touch ID’ Home Button
Biometric security is once again moving to the forefront of mobile technology. During Apple’s unveiling of the new iPhone 5s today, one of the newest features is the introduction of a fingerprint reader to add consumer-level biometric authentication. It is the first major U.S.-based mobile manufacturer to incorporate a fingerprint scanner since Motorola released the [Read More...]
Digital Certificates on Your Phone?
It’s not a Peyton Manning TV spot, but it’s certainly more important to the security of your identities. In Entrust’s recent infographic, “Mobile Security: Perception vs. Reality,” a third-party study found that 38 percent of enterprises have or plan to implement mobile device certificates in 2013. But there is also the myth that certificate-based identities [Read More...]
Not All Multifactor Authentication Techniques are Equal
This fact seems to be lost on some who are responsible for security architecture. One of my reflections on this past summer is that not everyone is aware of the difference between weaker and stronger forms of multifactor authentication. You have likely read about multifactor authentication, have used it with your social networking websites, or [Read More...]
Passwords Too Weak for Today’s Digital World
Think of all of the websites that you utilize online that require passwords to protect your sensitive information. You have a password for your online bank account, your email, your credit card accounts — the list goes on. Out of all of those websites, however, how many unique passwords do you have? Not too many? [Read More...]
A Glance at Mobile Security: The Secure Container
When a company decides to mobilize, it often allows many of its central processes to be governed by remote devices apart from its central server. This often goes beyond basic email and contact lists and includes important corporate applications that, if compromised, could lead to devastating organizational consequences. Yet, according to a Forrester Consulting report, [Read More...]
The Way Forward
The title may come across a little more literary than a normal technology or security blog, but this is what I want to discuss: the way forward in security software. Cybersecurity is a market in flux. And, from where I sit, the way forward is simple and hinges on three things. Mobile a key market [Read More...]
A Glance at Mobile Security: The Secure Element
Today, mobile technology is a standard method of conducting business. As smart devices become more capable of harboring and transferring information, IT executives are relying on them more and more to contain and transmit sensitive data. In fact, a recent Forrester report, “Mobile Authentication: Is This My App? Is This My User?” suggests more than [Read More...]
What is Driving Growth in the Authentication Market?
I recently read an article that pegged the global growth rate for multifactor authentication at 17 percent. This is a substantial compound annual growth rate (CAGR) when you take into consideration the size of the market and the nascent growth of some key players. Then I considered Entrust’s relative position in the market and in [Read More...]