Mobile World Congress 2018: Creating a More Secure Future

It’s almost mandatory to start any Mobile World Congress blog by pointing out that no-one goes to MWC anymore to see the latest mobile phones. This was doubly true this year after the big Samsung launch was leaked before the event. The leak was through an attack on their mobile app – something that is easy to defend against. I wonder what it cost them marketing pizazz.

Mar 9, 2018
Mobile Connect demo
Using Mobile Connect & biometrics - live demo

In this short live demo, GSMA Strategic Partner Ray Kimble presents how Mobile Connect can work. You will also see Inside Secure Strong Authentication and biometrics in action. The video was filmed during GSMA Mobile World Congress 2017 in Barcelona.

Feb 22, 2018
White paper: Cloud strategies for the digital threatscape

As conventional, self-managed IT security proves increasingly costly and vulnerable to hackers, hosted services are rapidly growing in popularity. Though security as a service (SECaaS) is not a new idea – it’s time has come. As we look at market and industry trends, we predict that security as a service (SECaaS) will become the defacto business model for security very quickly, and we illustrate three real-world examples of how this is happening today.

Feb 19, 2018
zero day attack
What exactly is a zero day attack?

Quite often you will see news talking about zero-day attacks or vulnerabilities. What does this mean exactly? Here's a short answer to the question.

Feb 15, 2018
true randomness
The Importance of True Randomness in Cryptography

In the world of information security, we often see statements such as ‘secured by 128-bit AES’ or ‘protected by 2048-bit authentication’. We are used to people asking about the strength of the cryptographic algorithms deployed in a security solution. Algorithms such as the AES, RSA and ECC have a proven track record of being difficult to break. They are successfully deployed in protocols that protect on a daily basis our identity and the integrity and confidentiality of our data. Consider as examples the use of SSL or TLS when you buy a book at Amazon or when you connect to your bank account to transfer a sum of money. Or the use of IKE and IPsec when you connect your laptop to the company network to check on your email and read documents stored on the company network.

Jan 30, 2018
Mosaic timeline
MOSAIC: Shaping the future of storytelling takes guts – and security

With today’s newest technology, tools and scalable infrastructure, filmmakers can now bring interactive storytelling to a mass audience. There are many ways of doing that, one of them being the MOSAIC by HBO and Steven Soderbergh.

Jan 24, 2018
  • 1 (current)
  • 2