eIDAS smart card

Now that the eIDAS Regulation is in full effect, the ease of cross-border digital business is a reality in the EU. The new Regulation comes at an opportune time to make trusted communications between businesses, citizens and public authorities easier in Europe – removing the previous hurdles and fragmented legal frameworks from the Regulation’s predecessor, the EU Directive. Many people believed that the Directive mandated the use of the Qualified… Read more


eIDAS: Making Cross-border Digital Business a Reality – Today

A new e-signature Regulation in the European Union comes into effect today, July 1, 2016, which will have an immediate and positive impact on cross-border commerce across Europe. Replacing the existing EU Directive, Electronic Identification and Trust Services for Electronic Transaction (eIDAS) now uniformly recognizes all forms of e-signature – regardless of local interpretation – making it easier to do business across the continent and creating a single, digital market…. Read more


FFIEC-mobile-financial-Guidance

The debate over the relative importance of mobile banking was settled long ago. Mobile banking is already the number one channel for many customers of financial institutions, it is being used by about half of those with a banking relationship, it has grown to become the number two preferred channel overall and will soon become number one, and there is nothing on the horizon that can reverse these trends. Unlike… Read more


The impact of data breaches within the Healthcare Industry

The integration of technology within the healthcare sector continues to create seismic changes in how individuals receive medical care. Yet in their rush to adopt technology designed to improve the consumer’s experience, organizations within the healthcare industry face the very real threat of sensitive patient data ending up in the hands of cybercriminals. When it comes to the value of stolen data within the criminal underground, the more personal the… Read more


May 31, 2016 - Jodi Schechter
Face Recognition for Mobile Apps – As Easy As Taking a Selfie

Next time you take a selfie, it could be used for your own protection. Face Recognition is a simple, secure and user-friendly security feature that utilizes multiple facial data points to accurately authenticate end users and next generation likeness detection to defeat hacker spoofing techniques. The basic premise of biometric authentication is that everyone is unique and an individual can be identified by their intrinsic physical or behavioral traits. Much like fingerprints, face… Read more


A Shift in the Wind – Securing Patient Portals

I thoroughly enjoyed my time at HIMSS16 in Las Vegas. It was great to be back, see old friends and make new ones. The landscape, as it relates to security has certainly changed since my first HIMSS Conference in 2008. I recall walking the exhibit hall discussing multi-factor authentication and identity management only to receive blank stares or interesting comments from prospective partners and customers.   I heard, “we use usernames and… Read more


On the road to trusted identities in healthcare, or just more compliance work?

On Feb 9th, the Senate health committee unanimously (22-0) approved wide-ranging legislation designed to improve health IT by modifying requirements relating to the development and use of electronic health records (EHR). Senate Bill S. 2511, “To improve Federal requirements relating to the development and use of electronic health records technology” is clearly a result of Congress’ displeasure with the lack of interoperability, data sharing and security in our healthcare system… Read more


Electronic Signatures Vs. Digital Signatures – Defining the Difference

To satisfy the expanding need for esignatures in every industry, VASCO recently acquired a leader in the electronic signature space—eSignLive. With many of our clients asking for digital signature services, we wanted to make sure that YOU know the difference between digital signatures and electronic signatures—and how the two should work together to provide a secure and legally binding solution to your document-signing needs. eSignLive’s Defining the Difference blog is… Read more


Top 5 Security Stories in 2015

2015 was a remarkable year in the IT security area. There was never a dull moment with novel attack methods, new enemies, massive breaches of healthcare organizations and the OPM, Hacking Team’s embarrassing takedown, and cars and toys becoming targets. Hard to imagine it all fit into just 365 days and it doesn’t look like it will slow down one bit with the New Year. Below is a brief look… Read more


Touch ID

Biometrics – specifically the use of fingerprints, iris scans and facial recognition as a means of authentication – increasingly has become an accepted part of daily life. Several governments, including the United States, Canada and United Kingdom, have adopted biometrics, as the technology continues to improve. In 2013, Apple introduced Touch ID, a fingerprint scanning technology embedded in the company’s new (at the time) iPhone 5s. Touch ID signaled the… Read more