Information Risk Management

Displaying 1-2 of 2 results

  • White Papers // May 2011

    Bootstrapping Mobile PINs Using Passwords

    The authors describe a method of deriving PINs from passwords. The method is useful to obtain friction-free user on-boarding to mobile platforms. It has significant business benefits to organizations that wish to introduce mobile apps to existing users - but which are reluctant to make the users authenticate with passwords....

    Provided By Information Risk Management

  • White Papers // Oct 2008

    Targeting VOIP

    As more and more companies move towards a full scale replacement of conventional PSTN phones with a VOIP infrastructure, there is an increased incentive for malicious individuals to break into the phone architecture. The main benefit of implementing VOIP over conventional phone systems is cost saving and efficiency. With the...

    Provided By Information Risk Management

  • White Papers // Oct 2008

    Targeting VOIP

    As more and more companies move towards a full scale replacement of conventional PSTN phones with a VOIP infrastructure, there is an increased incentive for malicious individuals to break into the phone architecture. The main benefit of implementing VOIP over conventional phone systems is cost saving and efficiency. With the...

    Provided By Information Risk Management

  • White Papers // May 2011

    Bootstrapping Mobile PINs Using Passwords

    The authors describe a method of deriving PINs from passwords. The method is useful to obtain friction-free user on-boarding to mobile platforms. It has significant business benefits to organizations that wish to introduce mobile apps to existing users - but which are reluctant to make the users authenticate with passwords....

    Provided By Information Risk Management