Steve Watts

Subscribe to Steve Watts: eMailAlertsEmail Alerts
Get Steve Watts: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Steve Watts

Secure Authentication Is the Only Solution to Vulnerable Public Wi-Fi Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it's used to access a presentation at a new client meeting, to host a video conference call, or edit and email important documents, public Wi-Fi means nearly anywhere can become an office. Couple this with the fact that there are as many mobile devices on the planet as there are people, and businesses now have the most flexible and tech-saturated workforce in history. Recent studies have found that 37 percent of office workers are regularly working remotely two or more days a week.[1] Hotels, cafés, restaurants, trains and airlines allow visitors to remain online. Flexible working has put demands on employees to be connected to corporate systems for as long as possible - even ... (more)

Adaptive Two-Factor Authentication: Is It All It’s Cracked up to Be? | @CloudExpo #Cloud

It's a given that employee access to corporate systems should be both as secure and simple as possible. Up until recently however, time-strapped CIOs, under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn between relying on the fatally flawed password or hard token two-factor authentication (2FA) to keep their systems secure. Recently, adaptive authentication has gained in popularity, as it reduces the time it takes to log-in by verifying a user based on their location. But is this the best solution? ... (more)

Cyber Insurance: No Longer a Want, But a Need | @CloudExpo #Cloud

Cyber insurance is an important element for companies as it covers the damage and liability caused by a hack, which are usually excluded from traditional liability coverage.  Stricter data privacy notification laws, government incentives, cloud adoption and the increase in high-profile hacks and data breaches have all contributed to the significant increase in the number of companies offering and buying cyber insurance. All companies face varying levels of risk, which warrants the need for a cyber insurance policy.  You can look at two candidates for such a policy: first, compa... (more)

Five Seconds to Protect Businesses | @CloudExpo #Cloud

It is important to accept that threats come in many forms and can affect businesses greatly, for example, 15 per cent of large organisations suffered from a security or data breach in the last year involving smartphones or tablets. With increased employee mobility, businesses must equip staff to access corporate data from these devices securely. Data security issues and security breaches within businesses are now a regular occurrence. Everyday it seems that we are hearing about a new cyber attack or security flaw and just recently it was announced by CEBR and Veracode [i] that c... (more)

Adaptive Two-Factor Authentication | @CloudExpo #WebPerf #Microservices

It's a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been torn between relying on the fatally flawed password or hard token two-factor authentication (2FA) approach to keep their systems secure. As a result, adaptive authentication has gained popularity as it reduces the time it takes to login by verifying a user based on their location. End users want speed, stability and consiste... (more)