What is Identity Management?

It can be seen that due to the growth of technology, online and offline identities have become intertwined. This is a result of individuals having an online personality that is different from their offline one. The internet is a vast world of varied identities and sometimes such represented identities may not coincide with what has
Continue Reading »

What is Password Synchronization?

Passwords. Sometimes it’s the only important attribute that stands between your important data, information and a hacker. We’re told time and time again that we need stronger and robust passwords as this will prevent cyber-attacks, and yet we continue to use easily guessed passwords (though we’re getting better). Edward Snowden exposed the NSA for questionable
Continue Reading »

Cyber Security is an Important Factor for Businesses

We’ve reached the middle of the year where businesses have begun to take their data security more seriously. A reason to this can be the increased number of attacks taking place. A recent report done by Cisco outlines that employees are still an easy target when it comes to cyber-attacks and protecting data. A leading
Continue Reading »

The United States’ Network Neutrality Ruling Puts a Focus on Data Management and Security.

A recent order for Internet broadband service providers adopted in February by the U.S. Federal Communications Commission may have large scale implications not only from a data management position, but also from a network security standpoint. At the very least, ruling may offset potential overhead cost escalations that the alternative may have caused for many
Continue Reading »

Access Manager 1.1: End of Life

In June 2014, Nervepoint Technologies released Access Manager 1.2; it provides a new user interface, support for multiple types of user databases, as well as a range of exciting new features. It can be seen that the Version 1.2 is now a unique product in comparison to Version 1.1. What is more, 1.2 features and
Continue Reading »

What Are SSL Certificates?

If you’re a user of Mozilla products, like Firefox or Thunderbird, you may have heard that the company will stop trusting unknown SSL certificates, citing these types of certificates are cryptographically unsafe. The type of certificates they are denying at the 1024-bit keys however, websites that have 2048-bit keys are fine and are up to
Continue Reading »

Going Phishing in Banking

The headlines can be seen everywhere: Hackers’ $1 billion bank theft may still impact consumers, JPMorgan and Other Banks Struck by Hackers, How safe are you and your bank from cyber attack? Morgan Chase warned that cyber attacks are growing every day in strength and velocity across the globe. He said, “It is going to
Continue Reading »

Authentication Issues: New Apple Payment System Linked to Frauds

Sophocles is noted as saying that it is better to fail with honor than to succeed by fraud. Unfortunately, for Apple this philosophy isn’t shared by criminals within the Apple Payment System. Relaxed authentication practices used by the banking institutions have led to fraud issues with the Apple Payment System. New exploits linked to Apple
Continue Reading »

Words of Wisdom: The Worst Passwords of 2014

American Author Clifford Stoll has argued that the best quote whilst teaching others the importance of proper password safety is: “Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” This quote is perhaps the best way to teach your children proper password procedures, along
Continue Reading »