The role of online security can be compared to that of the brakes in a car. The brakes aren’t there to stop the car; they exist to allow us to go faster while still remaining safe. Ideally, our security should operate on exactly the same principle – seamless, unobtrusive, simple and invisible – a means to enable us to navigate our daily lives unencumbered and with ease.
20 Feb, 2015Drive online security forward and make it fast
19 Feb, 2015Gallagher nabs government contracts, NEC wins in Vegas
Gallagher has been chosen to assist the U.S. Customs and Border Protection to secure a terminal cross-border facility on the west coast; the Las Vegas Metropolitan Police Department announced a multi-year contract with NEC Corporation that will see the company’s multi-modal solution deployed for law enforcement identity services; Intercede launches MyTAM, a service that enables organizations such as app developers, service providers, banks and media streaming companies to load apps into the Trusted Execution Environment (TEE) built into chipsets in Android devices.
19 Feb, 2015Vanderbilt, Vodafone pilot emerging access control tech
Take your pick – Bluetooth or NFC for physical security
HID Global is piloting Mobile Access on both sides of the world, enabling virtually any smartphone to function as a physical access control credential using either near field communication or Bluetooth low energy.
17 Feb, 2015GSA revising physical access, identity management under the Schedules Program
The GSA is working with industry to clear up confusion around its Schedules Program and where FIPS 201 products can be found. This was the case for items and services on GSA’s Schedule 70 – IT products and services – and Schedule 84 – security systems, law enforcement and building controls related products and services. When it comes to products for FIPS 201 and physical access products could be found on both Schedules.
17 Feb, 2015New and improved consumer authentication: If you build it, they will come
Despite high profile data breaches at companies, including Target and Sony, consumer behavior toward protecting personal identifiable information has not changed significantly. A substitute for password or PIN-based authentication must be at least as simple, if not much simpler, than current methods of authentication. People want better security, but the way we will get there is through convenience.
16 Feb, 2015Mobile changing financial services risk profiles
Mobile apps provide an opportunity for financial service providers to create a foundation for security and convenience. To capitalize on this, institutions need to ensure that they are making the most of the device capabilities by enabling strong, cryptographic, device-based authentication. The goal, however, is to hide the security complexity from the user to both increase compliance and eliminate authentication hassles.
16 Feb, 2015MorphoTrust, Confyrm, GSMA detail NSTIC pilots
The U.S. Department of Commerce last year announced three pilots in support of the National Strategy for Trusted Identities in Cyberspace (NSTIC). The $3 million in grants will be shared among the three recipients – MorphoTrust, Confyrm and GSMA – as they pilot solutions exploring mobile devices instead of passwords for online authentication, minimization of loss from ID theft and improved access to state services.