Category Archives: Opinion

Survival together in a business eco-system

How to build the biggest enterprise without actually making anything is the impossible dream. Yet look at the market! Once where ICI, IBM and Glaxo once stepped, these global operators with products to sell, are now replaced with corporations with … Continue reading

one tap, one swipe; the key to keeping your secrets

Keeping secrets secure has been an issue since early Inuit’s kept information from one  tribe to another, so this isn’t a new phenomenon. What has changed is it’s no longer if data can be kept secret, it’s a question of … Continue reading

Is adaptive authentication really adapting to users or just adding complexity?

German IT Security authority ‘all-about-security’ interviewed Fabian Guter, SecurEnvoy’s EMEA Manager to understand more about the tokenless proposition. Click here for the Voice Interview. In a podcast-style presentation he is asking critical questions to his guests. In this interview, he … Continue reading

Cut your security risk by 45% – with a smart phone

Cybercrime is big news with those behind it often painted as geniuses carrying out complex and difficult tasks from their terminals in ill-lit rooms.But in real life, hacking is much more mundane –  more akin to the burglar who walks down … Continue reading

The answer to Shadow IT is at your fingertips

If you haven’t heard of the term Shadow IT yet, you will do soon. Shadow IT is used to describe information-technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term … Continue reading

The Holy Grail of Authentication

With consumers well versed in how to use 2FA and the importance of it to keep their private data safe from prying eyes, the question is why can’t the same be said about the security used by businesses? Surely the … Continue reading

Secure authentication is the only solution to vulnerable public Wi-Fi

Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it’s used to access a presentation at a new client meeting, to host a video conference call, or … Continue reading

Adaptive two-factor authentication: is it all it’s cracked up to be?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. Up until recently however, time-strapped CIOs, under pressure from demanding staff and challenged with authenticating users all over the world on multiple … Continue reading

Adaptive Two-factor Authentication: An Easy Solution for CIOs?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been … Continue reading

Hackers are powerless with zero knowledge 

Every day hackers are being equipped for their next attack, as more and more users are trusting organisations with their personal information online. But with zero knowledge, hackers can be rendered powerless.