Category: From CTO’s Desk

Einstein famously defined insanity as “doing the same thing over and over again and expecting different results.”
We may relate this saying with redundant and repeated function/process that companies continue to follow including archaic security strategies while data breaches. There are cases guiding IT security strategists to take … Read More

With a spike in cyber-attacks, financial services firms are leveraging innovative tools for combating this threat. Companies are now looking at improving security programs, using technologies such as Identity and Access Management (IAM), cloud-based cyber-security, Biometrics, Big Data Analytics, Privilege Account Management (PAM), together with advanced authentication.
According … Read More

Is it time to bid adieu to passwords and say hola to fingerprints? Are we finally moving towards a virtual world where the human body could be the key for accessing physical or virtual systems? Will biometrics sound the death knell on passwords or are we speculating … Read More

If you have experienced no such activity then you are either lucky or oblivious. In case you have delayed securing your network then you are vulnerable to Cyber Trespassing. From an organisational standpoint, putting in place firewalls and anti-virus is fine, but … Read More

As commonly known, API stands for application programming interface, that helps bring together a wide range of business services in order to facilitate organizational growth. Similarly, an Identity API is a well-defined HTTP/S based service that makes everything from a single … Read More

“In 2013, mobile devices will pass PCs to be most common Web access tools. By 2015, over 80% of handsets in mature markets will be smart phones.” -Gartner Research
Corporate world all over the map is embracing the mobile wave and the last five years have seen an expanding … Read More