Align Interview: Former Gemalto executive Martin McCourt on the equation for startup success

By Fred O'Connor | January 8, 2020
The Align Interview series offers the perspectives of  executives on technology, security and digital transformation. Aspiring entrepreneurs take note: find a problem to solve if you want your startup to grow.   “Startup equals problem. It’s a simple equation. Find a customer problem worth solving and solve it better than anyone else and you’re well on […]
Read More

Align Interview: Former Met Police CIO Richard Thwaite on why digital transformation starts with people

By Fred O'Connor | October 30, 2019
The Align interviews offer the perspectives of CIOs and CISOs on technology, leadership, security and digital transformation.  For any digital transformation project to succeed CIOs need to keep in mind the people who will be impacted. That’s the advice from Richard Thwaite, who’s served as CIO of the Metropolitan Police Service, UBS Global Asset Management […]
Read More

To succeed in security, think about the business

By Fred O'Connor | October 8, 2019
Deep security knowledge isn’t the only skill CISOs need. To succeed as a security leader, knowing how security can enable the business, especially around providing a better user experience, is also essential, judging by a panel discussion at the Financial Services CyberTech Forum, which was recently held in London. Security is a part of the […]
Read More

Why enterprises are interested in passwordless authentication

By Fred O'Connor | September 12, 2019
Everyone seems to want to stop using passwords. Security and IT professionals loathe them because they’re a key infiltration tool. Anyone who handles user experience dislikes passwords because they’re not very user friendly. Despite grumbling about passwords, they’ve been the main way we authenticate since the 1960s, mainly because no one has come up with […]
Read More

Countering APT credential use with passwordless authentication

By Fred O'Connor | July 22, 2019
Stolen credentials played a critical role in a recently disclosed cyberespionage campaign that targeted 10 mobile carriers around the world, showing that leveraging usernames and passwords remains a key tactic for threat actors and demonstrating why companies are looking into passwordless authentication.   In that attack, a cyberespionage group connected to China first exploited a vulnerability […]
Read More

Japan looking at facial recognition to restrict addicts from gambling

By Fred O'Connor | March 14, 2019
The Weekly Cypher is curated to keep you up-to-date on the latest in biometric and cybersecurity news. Here are a few headlines you may have missed this week. Japan looking at facial recognition to restrict addicts from gambling | Biometric Update The government of Japan plans to ask gambling venue operators to consider using facial recognition […]
Read More

Chinese and Iranian hackers renew their attacks on US companies

By Fred O'Connor | February 22, 2019
The Weekly Cypher is curated to keep you up-to-date on the latest in biometric and cybersecurity news. Here are a few headlines you may have missed this week. Chinese and Iranian hackers renew their attacks on US companies | The New York Times Businesses and government agencies in the United States have been targeted in […]
Read More

Hacked MyFitnessPal data goes on sale on the Dark Web – one year after the breach

By Fred O'Connor | February 15, 2019
The Weekly Cypher is curated to keep you up-to-date on the latest in biometric and cybersecurity news. Here are a few headlines you may have missed this week. Hacked MyFitnessPal data goes on sale on the Dark Web – one year after the breach | Fortune The MyFitnessPal app disclosed a data breach last year affecting […]
Read More

What the government shutdown teaches us about cybersecurity

By John Callahan | February 13, 2019
The partial shutdown of the U.S. government last month prevented ranchers from applying for farm loans, Coast Guard personnel from getting paid and tourists from visiting the Smithsonian Institution. It also had an impact on cybersecurity. For example, the security certificates used by more than 130 US government websites expired, which made it easier for threat […]
Read More