Face Recognition for Mobile Apps – As Easy As Taking a Selfie

Next time you take a selfie, it could be used for your own protection. Face Recognition is a simple, secure and user-friendly security feature that utilizes multiple facial data points to accurately authenticate end users and next generation likeness detection to defeat hacker spoofing techniques. The basic premise of biometric authentication is that everyone is unique and an individual can be identified by their intrinsic physical or behavioral traits. Much like fingerprints, face… Read more


A Shift in the Wind – Securing Patient Portals

I thoroughly enjoyed my time at HIMSS16 in Las Vegas. It was great to be back, see old friends and make new ones. The landscape, as it relates to security has certainly changed since my first HIMSS Conference in 2008. I recall walking the exhibit hall discussing multi-factor authentication and identity management only to receive blank stares or interesting comments from prospective partners and customers.   I heard, “we use usernames and… Read more


On the road to trusted identities in healthcare, or just more compliance work?

On Feb 9th, the Senate health committee unanimously (22-0) approved wide-ranging legislation designed to improve health IT by modifying requirements relating to the development and use of electronic health records (EHR). Senate Bill S. 2511, “To improve Federal requirements relating to the development and use of electronic health records technology” is clearly a result of Congress’ displeasure with the lack of interoperability, data sharing and security in our healthcare system… Read more


Top 5 Security Stories in 2015

2015 was a remarkable year in the IT security area. There was never a dull moment with novel attack methods, new enemies, massive breaches of healthcare organizations and the OPM, Hacking Team’s embarrassing takedown, and cars and toys becoming targets. Hard to imagine it all fit into just 365 days and it doesn’t look like it will slow down one bit with the New Year. Below is a brief look… Read more


A famous Warren Buffet quote starts with this statement, “It takes 20 years to build a reputation and five minutes to ruin it…” For financial institutions, few things are as potentially damaging as customers suffering losses because of social engineering schemes. These types of attacks undermine consumer confidence in a bank’s brand, put customers at great risk of financial loss, and collectively cost the financial industry countless millions of dollars… Read more


October 14, 2015 - Jan Valcke
system hacked

The lyrics, “Get your motor running, head out on the highway” may bring a lot more adventure in the future. Two security researchers wirelessly hacked a Jeep while it was being driven. They were able to take car hacking to the next level. They moved beyond dashboard functions and were able to compromise critical control mechanisms such as steering, transmission and brakes. The significance of this threat is off the… Read more


The big news in the security segment this week is the newly-formed agreement that President Barack Obama has struck with Chinese President Xi Jinping. With a backdrop of U.S. threats to launch counter-attacks, the two leaders agreed to refrain from state-sponsored cyberattacks against each other that attempt to steal trade secrets or competitive business information. Sounds pretty good on the surface, but as it is with any complex agreement, you… Read more


June 26, 2015 - Jan Valcke
The final days of user names and passwords

Last week’s announcement that the online password manager LastPass was hacked, made me realize that the term Secure Password has become the leading oxymoron of the 21st century. The issue of insecure passwords has resurfaced; this is once again a reminder to the need for one-time passwords. The average internet user typically administers twenty-five accounts. These twenty-five accounts are protected by on average six different static passwords, but users seem… Read more


The Three Laws of Cyber Fraud

Last week I attended the RSA Conference in San Francisco, which is probably the largest yearly cyber security conference and trade show in the world with about 22,000 attendees nowadays. One of the most popular sessions at the conference is the Cryptographers’ Panel, during which some of the founding fathers of modern cryptography discuss trends in research and cyber security in general. This year the panel consisted of Ron Rivest, Adi Shamir, Whit Diffie and Ed Georgio (former chief… Read more


January 19, 2015 - Tom Dubois
Top 5 Security Stories in 2014

2015 has just started, but we still want to look back to 2014 for a little moment. In every respect, it was a rough year for security, full of data breaches, cybercrime, and identity theft. We wonder what the future may bring. IT Security is an inexhaustible topic and the articles about it are plentiful. To make it easier for you, we’ve made a round-up with our top 5 security… Read more