Secure Mobile Transactions – Fact or Fiction?

June 12, 2013

Many banks and various other businesses, such as online betting, have embraced the ´Go Mobile´ trend to take advantage of the ubiquity offered by smart phone devices and have been developing their own apps, some of which store users´ credentials and other sensitive data in order to allow their clients to carry out transactions while on the move. Inspired by Apple iOS, Google Android and comparable operating systems, most app developers have directed their attention towards the user experience, but – as is often the case - few have placed emphasis on security, partially for priority reasons but also because of a lack of knowledge. In other words, despite the widespread adoption of smart phones, OSs (operating systems) still remain relatively immature when it comes to security. To tackle this, some initiatives such as the Trusted Execution Environment have emerged, but it could quite possibly take up to a decade before the average user will actually enjoy the security benefits when making a transaction with their preferred apps.

Spotlight

PFP Cybersecurity (Power Fingerprinting)

A disruptive cybersecurity company, PFP offers a physics-based integrity assessment of hardware, firmware, and core OS components. Once base lined, PFP detects both active and dormant attacks. It has been proven in detecting malware and hardware Trojans in mobile devices, PLC/SCADA, routers and semiconductor (FPGA), etc. It can also detect counterfeits. Received contracts from NSF, US ARMY, USAF, DARPA, and DHS. PFP is a portfolio company of the CIT GAP Fund and Blu Venture Investors. Selected as one of 2014 SINET 16 top emerging cybersecurity companies.

OTHER WHITEPAPERS
news image

Simplify Data Protection for VMware Workloads with Veeam Data Platform

whitePaper | March 1, 2023

Outages and data loss are an unfortunate reality for businesses today. These outages can cause big risks to your company’s reputation and revenue, as every minute of downtime means that critical data isn’t accessible to your business. If things weren’t complicated enough, managing a complex, hybrid, multi-cloud environment makes continuity even harder. These challenges increase complexity exponentially, greatly impacting your ability to stay in control.

Read More
news image

Security Whitepaper

whitePaper | October 5, 2022

AutodeskConstruction Cloud®is a cloud-baseddesign andconstruction project management platformdesigned to improve performance across a project’s lifecycle. As a secure,cloud-based platform, Autodesk Construction Cloudoffers the benefits of collaboration in the design and construction spacewhile safeguarding customer data. Autodesk Construction Cloudis designed and built using best-in-class cloud software practices and powered by Amazon Web Services (AWS), the world’s leader in cloud infrastructure. We havedesigned our services to be scalable and secure, thus providing our customers with a resilient and safeapplication. We know our customers’business is relying on us and we take that responsibility seriously.DocumentPurposeand ScopeThe purpose of this document is to outline Autodesk Construction Cloudoperations, software development,and security measures implemented in theenvironment.WHAT IS INCLUDED:The scope of this whitepaper includes all modules and services in AutodeskDocs, Autodesk Build(including PlanGridBuild), Autodesk Takeoff, Autodesk BIM Collaborate and Autodesk BIM Collaborate Pro (including Revit®Cloud Worksharing, Collaboration for Civil 3D®, and Collaboration for Plant 3D®).WHAT IS EXCLUDED:The scope of this whitepaper excludesthe following: Assemble, BuildingConnected, Pype,ACCConnect,BIM 360 Field, BIM 360 Glue, BIM 360 Plan, BIM 360 Ops, and BIM 360 Team. For more information on security practices for Autodesk products, visit theAutodesk Trust Center.

Read More
news image

Unify data security, privacy, and governance with contextual data classification

whitePaper | November 29, 2022

Enterprise data can be a transformative asset. It can unlock insights and intelligence to fuel innovation, accelerate organizational growth, and create a significant competitive advantage — so long as it’s properly used.

Read More
news image

HMC 1030 Connectivity Security White Paper

whitePaper | March 14, 2023

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Read More
news image

Cybersecurity Technologies for Cloud Access

whitePaper | September 14, 2022

The enterprises’ network and network security architectures are unable to effectively serve the dynamic secure access requirements of digital business. The enterprise data center is no longer the center of access requirements for users and devices.

Read More
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More

Spotlight

PFP Cybersecurity (Power Fingerprinting)

A disruptive cybersecurity company, PFP offers a physics-based integrity assessment of hardware, firmware, and core OS components. Once base lined, PFP detects both active and dormant attacks. It has been proven in detecting malware and hardware Trojans in mobile devices, PLC/SCADA, routers and semiconductor (FPGA), etc. It can also detect counterfeits. Received contracts from NSF, US ARMY, USAF, DARPA, and DHS. PFP is a portfolio company of the CIT GAP Fund and Blu Venture Investors. Selected as one of 2014 SINET 16 top emerging cybersecurity companies.

Events