Decision makers at banks ‘in the dark’ about data breaches

Decision makers at banks are in the dark when it comes to data breaches at their organization, according to KPMG’s 2016 Banking Outlook Survey. It revealed that this is especially the case when it comes to the second tier of senior management. For example, while 12% of CEOs were unaware as to whether their networks … More Decision makers at banks ‘in the dark’ about data breaches

Location-tracking apps ‘breach of European data protection law’

A study of 20 apps’ terms and conditions by the Norwegian Consumer Council has found that three location-tracking apps may be in breach of European data protection law. In an official complaint to the Norwegian Data Protection Authority, the consumer advocacy group singled out US-based fitness tracking app Runkeeper as a cause for concern. The … More Location-tracking apps ‘breach of European data protection law’

After authentication comes authorisation and access control

In our first post in this series, we talked about authentication: verifying whether someone is who he or she claims to be. In many instances, this is where system administrators call it a day, by giving all verified users equal access to network resources. But there is much to be gained by continuing to apply … More After authentication comes authorisation and access control

Authentication 101

Authentication may sound like a very complicated concept, but it’s quite simple: a way of showing that you are who you say you are. In the offline world this process is simple and universal. Most countries have well-documented procedures by which you can get a passport that demonstrates your identity wherever you go in the … More Authentication 101