Digital PINS – The Next Step in Digital First Banking

In the past decade, the banking sector has undergone a massive transformation – putting speed, security, environmental considerations and user experience at its core. This blog post will be looking at how Digital PIN – a modern way to set, deliver or recover an EMV Card PIN code – is part of the modern card […]

Morse Code: How did it change communication?

…. — .– / -.. .. -.. / — — .-. … . / -.-. — -.. . / -.-. …. .- -. –. . / -.-. — — ..- -. .. -.-. .- -.-. .. — -. ..–.. In today’s society, instantaneous messaging is something we both need and expect in our everyday lives. […]

World Password Day: Why are passwords still a problem in 2022?

World Password Day has come around again. Since its inception, it’s an awareness day designed to promote and reinforce the importance of better habits when it comes to password settings. As such, we expect to be inundated with research highlighting the percentage of consumers who still have ‘poor’ password habits, lists of the most common […]

World Password Day: Why we need a password-less future

If you’ve read part one, you’ll know that there’s a persistent problem with passwords. Despite the continued warnings, data breaches and endless guidance – weak and easily hackable passwords still guard a sobering number of online accounts and identities. Past experience tells us this is unlikely to change. If we journey back to 2004, at […]

Why Digital ID Should be On the Vacation Checklist

Vacation season is officially upon us, and after Covid-19 kept most of the world grounded for the best part of two years, airports and airlines are in for one of the busiest summers on record.   Thankfully, there are examples of technology use cases being implemented to save time at busy airports.   Use of Digital ID   […]

Only 32% Global Organizations believe Cloud Security is shared responsibility

A survey conducted by security firm Gemalto says that only 32% of Global Organizations believe Cloud Security is shared responsibility. Similarly, 34% of them say that ‘security’ is the sole responsibility of the cloud provider. The 2018 Global Cloud Data Security Study also disclosed some astonishing details about the cloud practices being carried out in […]

Hackers cyber attack Amazon Cloud to mine bitcoins!

Security firm RedLock has disclosed that Amazon cloud is being hacked by cyber crooks to mine bitcoins and to gather digital currency. The security intelligence company says that hackers are from Amazon Web Services to mine bitcoins and have so far succeeded in producing 7 BTC. These days as the Bitcoin rate is surging day […]

AT&T strengthens Internet of Things (IoT) offerings with Gemalto’s remote subscription management solution

 Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, is supplying AT&T with a remote subscription management solution that will help enable its customers to deploy new and highly secure IoT applications in the U.S. and globally. Gemalto’s LinqUS On-Demand Connectivity (ODC) subscription management solution and GSMA M2M 3.1 compliant Embedded SIMs (eSIMs) will […]

Gemalto launches LTE Cat. M1 wireless module to enable new IoT use cases

Amsterdam, January 4, 2017 – Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, is launching a leading edge LTE Cat. M1 wireless module for IoT solutions . The new Cinterion® LTE Cat. M1 solution takes network efficiency and simplicity to new heights, delivering LTE for Machine-Type-Communication (MTC) and improved power savings that enables […]

Gemalto is the global leader in digital security, with 2015 annual revenues of €3.1 billion and customers in over 180 countries. We bring trust to an increasingly connected world. Our technologies and services enable businesses and governments to authenticate identities and protect data so they stay safe and enable services in personal devices, connected objects, the cloud and in between. Gemalto’s solutions are at the heart of modern life, from payment to enterprise security and the internet of things. We authenticate people, transactions and objects, encrypt data and create value for software – enabling our clients to deliver secure digital services for billions of individuals and things.
Share this page

Sign Up for Your Weekly
Cybersecurity Insiders Newsletter

Sign up for the free newsletter! Join thousands of cybersecurity professionals to receive the latest news and updates from the world of information security.

Thank You For Signing Up!