multifactor authentication

It’s remarkable just how many significant security breaches could have been prevented if only multifactor authentication technology had been deployed. A lack of strong authentication is the reason behind the recent breach of the popular mobile app Timehop, which lets users see social media posts from the same date in previous years. The breach exposed the credentials, phone numbers and… Read more


Windows Logon

In light of constantly evolving cybersecurity risks, businesses must take strong measures to secure internal and remote network access by employees. Today’s workforce requires convenient anytime, anywhere access to web, mobile and cloud networks, applications and resources. Clearly, timely access to information drives business forward. At the same time, organizations must prevent security breaches, and maintain continuous compliance with security… Read more


GDPR

Who owns your data, and what privacy laws govern it? Well, that depends on where you live. If you own it, you should have control over it. If you don’t own it, how secure is it? Recent data breaches that affected the majority of Americans have begun a national dialogue around the security of personal data. In fact, the high… Read more


June 26, 2015 - Jan Valcke
The final days of user names and passwords

Last week’s announcement that the online password manager LastPass was hacked, made me realize that the term Secure Password has become the leading oxymoron of the 21st century. The issue of insecure passwords has resurfaced; this is once again a reminder to the need for one-time passwords. The average internet user typically administers twenty-five accounts. These twenty-five accounts are protected… Read more


June 18, 2014 - John Gunn
Do Cloud Applications Deliver Convenience or Danger?

Banned. Condemned. Not Allowed. These are some of the phrases used to describe what I consider some very useful cloud applications. As technological advances bring more consumer gadgets into our business environments, we as users begin to lose track of where our personal domain ends and our employer’s begins. It’s convenience that drives adoption of public cloud applications, mobile devices,… Read more


Could your mobile voicemail system help hackers unlock your online accounts?

In 1993, Peter Steiner submitted a pen-and-ink cartoon to The New Yorker magazine, featuring two dogs at a desk.  One of them is sitting in front of a computer screen and says to the other: “On the Internet, nobody knows you’re a dog” Steiner and The New Yorker probably didn’t realise at the time just how true that was, and… Read more


On Monday April 7th, news broke about the so-called Heartbleed bug. Heartbleed is a flaw in OpenSSL, a software library implementing the Transport Layer Security (TLS) security protocol. TLS is widely used to protect communication via websites, e-mail, instant messaging, etc. It can be recognized by the prefix “https” or by a lock in the address bar of a browser. The… Read more


effective authentication solution

Implementing an effective authentication solution can only be achieved by finding a true balance between security, user-friendliness and total cost of ownership. When looking for a solution to secure your online application, you will run into conflicting goals. You want the solution to be as secure as possible, but at what cost? And of course, you want your customers to… Read more


March 12, 2014 - Jan Valcke
cracking passwords

A while ago, Ars Technica, a US magazine, had a rather eye-opening experience. A list of 16,000 encrypted passwords was given to Nate Anderson, the publication’s Editor-in-Chief, then to three cracking experts. After a few hours’ work, Nate Anderson, though a newcomer to the field, managed to decipher nearly half of the 16,000 passwords. The three seasoned crackers between them… Read more