Category Archives: Opinion

The role of SMS in user authentication

Online systems require a mechanism to ensure that whoever is accessing them is a legitimate user. For many systems, it is enough for users to enter their username and password to verify their identity. Security in such a situation can be … Continue reading

Multi factor authentication doesn’t need to be hard

  There was a time when two-factor authentication was a major undertaking. New servers had to be installed, security tokens had to be purchased, distributed and registered to their owners and then Support desks had to be created to handle … Continue reading

Authentication of tomorrow

The merging of the organic and digital worlds is undoubtedly gathering pace. As humans, we are now huge consumers of technology, which has led to patience being a virtue for very few. However, this patience is being tested on a … Continue reading

Authentication just got even easier than using a password!

Our vision for the future has arrived; users can easily tap an NFC ready device, phone or wearable device to to authenticate themselves as the user! Imagine how easy that would be for moving cash or paying bills, for social media … Continue reading

Securing your Personal Entry Points

In recent years there has been a significant shift in an employee’s technology preferences at work, in part shaped by how they are using technology in their personal lives and the increasing trend for bring your own devices (BYOD). We are … Continue reading

Survival together in a business eco-system

How to build the biggest enterprise without actually making anything is the impossible dream. Yet look at the market! Once where ICI, IBM and Glaxo once stepped, these global operators with products to sell, are now replaced with corporations with … Continue reading

one tap, one swipe; the key to keeping your secrets

Keeping secrets secure has been an issue since early Inuit’s kept information from one  tribe to another, so this isn’t a new phenomenon. What has changed is it’s no longer if data can be kept secret, it’s a question of … Continue reading

Is adaptive authentication really adapting to users or just adding complexity?

German IT Security authority ‘all-about-security’ interviewed Fabian Guter, SecurEnvoy’s EMEA Manager to understand more about the tokenless proposition. Click here for the Voice Interview. In a podcast-style presentation he is asking critical questions to his guests. In this interview, he … Continue reading

The answer to Shadow IT is at your fingertips

If you haven’t heard of the term Shadow IT yet, you will do soon. Shadow IT is used to describe information-technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term … Continue reading

The Holy Grail of Authentication

With consumers well versed in how to use 2FA and the importance of it to keep their private data safe from prying eyes, the question is why can’t the same be said about the security used by businesses? Surely the … Continue reading