User Blogs

User Blogs

Discussions and Blogs
Jun 07
2013

What is a mobile wallet?

Posted by Robert Siciliano in Mobile Wallet

Robert Siciliano

Some say there will be a day when the wallet you carry in your pocket or purse will become obsolete. Technology is evolving in a way that will likely eliminate all our credit cards, store cards, and IDs. We will use our mobile devices as our primary means of commerce and identification. The technology behind mobile wallet combines near field communications (NFC) and applications. Depending on which is used, a user might need to wave their phone near a reader to make a payment or verify identification, or they may open an app and simply click a button.

Jun 07
2013

Florida Retirees Frequent Identity Theft Targets

Posted by Robert Siciliano in Untagged 

Robert Siciliano

A lot of Floridians are retirees who spend their days around the pool or at the beach. The warmer weather attacks both golden agers and unfortunately identity thieves. Criminals know that retirees have money in the bank, retirement accounts and credit cards with high limits.

Jun 03
2013

Weak Passwords Can Cost You Everything

Posted by Robert Siciliano in passwords , passwords

Robert Siciliano

If your computer or mobile was hacked or your passwords were cracked and your data was lost or if all the websites you have an account with were hacked and all that information was the hands of a criminal, how devastated will you be?

Jun 03
2013

Digital Security Improves Our Lives

Posted by Robert Siciliano in Digital Security

Robert Siciliano

Our lives depend on the convenience of digital and require the security behind the scenes. Take contactless payment for example. Contactless payments are a faster, more convenient alternative to cash when making small purchases at fast food restaurants, convenience stores, and transport terminals. They are also ideal for remote or unattended payment situations, such as vending machines, road tolls, or parking meters.

Jun 01
2013

How do I shop with my mobile securely?

Posted by Robert Siciliano in mobile security

Robert Siciliano

To stay safe while mobile shopping:

May 31
2013

What is mCommerce and how do you keep transactions safe?

Posted by Robert Siciliano in mCommerce

Robert Siciliano

mCommerce (or M-commerce) is using a mobile phone to make purchases. Like credit card transactions, your card/device can be either present or not present. In other words, “present” might mean your mobile is equipped with an application that you use to make a purchase in person, such as to buy a cup of coffee or a train ticket. “Not present” could be when you use another application or your mobile browser to make a remote purchase over the Internet or another type of mobile network.

May 24
2013

Announcing the Grand Opening of the GRC Marketplace

Posted by Cinthia Pilar in GRC Marketplace

Cinthia Pilar

We are pleased to announce the grand opening of the GRC Marketplace!

May 17
2013

What is malware and why should I be concerned?

Posted by Robert Siciliano in Malware

Robert Siciliano

“Malware” is a shortened version of the words malicious software. It is defined as: a generic term used to describe any type of software or code specifically designed to exploit a computer/mobile device or the data it contains, without consent.

May 15
2013

Job Posting: APPLICATION SECURITY CONSULTANT

Posted by Administrator in Jobs

Administrator

ORGANIZATION - Our client is a leading Information Risk Management consulting firm, which assists enterprises with designing and incorporating security into their information technology infrastructure. Their clients cross all market sectors worldwide including major High-Tech companies, Telecom operators, banks, government bodies and leading industrial organizations.

May 15
2013

5 Must-Have Security Apps for the Business Traveler

Posted by Robert Siciliano in security apps

Robert Siciliano

Prior to a trip it’s not uncommon for many of us to load up our smartphone with the latest time-killer games, social or travel apps. But an essential family of apps often overlooked revolves around security. Business travelers are in a unique category due to sensitive information they may carry but all of us are more at risk when we leave home and hit the road. Here are a few essential to take with you:

May 15
2013

Is That Mobile Application Invading My Privacy?

Posted by Robert Siciliano in Mobile Apps

Robert Siciliano

Facebook now offers “Home.” Facebook says “With Home, everything on your phone gets friendlier. From the moment you turn it on, you see a steady stream of friends’ posts and photos. Upfront notifications and quick access to your essentials mean you’ll never miss a moment. And you can keep chatting with friends, even when you’re using other apps. Cover feed puts the spotlight on whatever friends are sharing now—photos, status updates, links and more.”

May 14
2013

JAZD & Executive IT Forums Inc. Announce the Launch of Global B2B GRC Marketplace

Posted by Cinthia Pilar in Partner Offers

Cinthia Pilar

JAZD, the leader in online B2B directory service platforms, and Executive IT Forums Inc., publisher of ITGRCForum.com, announced today their new online Governance, Risk Management, and Compliance industry marketplace, GRCMarketplace, is now live and open to buyers here.


Subscribe via Email

 Your Email:

Tag Cloud

2012 abduction Aberdeen Group alarm alarms Android Apple Apps ATM Skimming Audit Bank Fraud Banking Security BillGuard BlackBerry botnet BPM breaches BS 25999 burglar burglary Business Continuity BYOD change management cheating children pictures Cloud Cloud Security Cobit collaboration Community discussion Compliance computer failure Consumer IT Tips contactless credit card credit card breaches Credit Card Fraud credit cards credit fraud Cross-Device Security Cyber gangs cyber monday Cyber Security cyberbullying cybercrime cybercriminal cybercriminals cybersecurity cyberwise data Data Backup Data Breaches data security Data Storage DDOS Device Reputation digital devices Digital Forensics digital life Digital Security digitally secure Disaster Recovery DNS download DPI driver's license dumps E-Commerce eBanking Electronic Discovery Electronic ESI electronic passport EMV Endpoint Security entity theft Epsilon ERM ESI Ethics Events Facebook FCC FCPA FDIC Federal Government FFIEC Financial Crisis firewall FourSquare Fraud gaming Gartner Geo-tagging gold farming Governance GPS grc GRC evaluation GRC Marketplace GRC technology readiness GRChange Green IT grey charges guard dogs Hackers Hackproof Hacktivism holidays home invasion home security Hotspot HP IAM iCloud id ID Theft Identity theft Information Management Information Security Information Supply Insider Threat Internal Audit Internal Controls internet safety iOS app iovation IP address iphone iPhone security ISACA ISO 27000 ISO 27001 ISO 31000 IT Alignment it compliance it governance IT GRC Forum Events it risk management IT Security IT Service Management ITIL jailbreaking Jobs keylogger laptop security Litigation Malware marathon mCommerce Member Discount Mobile Mobile Apps Mobile Banking mobile device Mobile Device Management Mobile Devices Mobile payment mobile phone mobile security Mobile Wallet mSecurity Multi-Regulatory Compliance multifactor authentication myblog Network Security New Years NFC NFC app Online Backup Online Banking online dating online gaming online identity online privacy online safety Online Security online shopping Operational Management OSHA Outsourcing P2P Security Panel Partner Offers passport passwords PCI Performance Management personal data personal device Personal Security pheasting phishing Policy predator Privacy Prize Draw QR Codes ransomeware ransomware Regulation E remote access resume fraud Risk Assessment Risk Management RSA Rules safety tips scam scammer scammers Scams scareware Seasonal Security security apps security tips sext Shopping shredding skimming Skimming Fraud small business smartphone smartphones smishing Social Media social network Social Security SOX spammers spokesman Spyware SSDs Standards strangers Strategy tablets tax scams Tech tech support technology Threat Management Tokenization TQM Twitter typosquatting Virus VPN wallet web Webcast Q&A Wi-Fi WIFI WiFi password wireless
Banner