News & events

Security by Design and Secure by Default

April 10, 2017

The security threat landscape is constantly evolving in this digital age, and meeting the challenges of these threats requires the right expertise. One of the major challenges of IT security is the fact that security has not traditionally been considered in product design for networking appliances and objects that have …
Read more

Fraud prevention with trusted identities

April 04, 2017

Using trusted identities to fight fraud and reduce customer friction The past years was marred by data breaches, hacks and data theft. With every successful cyber attack, the black market for personally identifiable information grew, widening the pool for hackers to buy stolen identities and engage in fraud. These crimes …
Read more

Weak passwords means weak security

March 21, 2017

Passwords are the most common form of authentication used to control access to information because they are simple, inexpensive, and convenient mechanisms to use and implement. At the same time, passwords are also recognised as being an extremely poor form of protection. There are over 10 million username/password pair attacks …
Read more