This document discusses the future of public key infrastructure (PKI). It begins by introducing SecureMetric Technology, a company that provides two certification authorities in Malaysia and five in Vietnam. It then discusses what PKI is, including different types like roaming PKI. The document outlines why PKI is important by listing its four trust requirements. It provides examples of real-world PKI implementations in areas like the Malaysian customs department. Emerging trends in mobile PKI and its components in governments, banks and enterprises are also examined. SecureMetric's PKI tokens on display are then highlighted before concluding.
This document discusses the future of public key infrastructure (PKI). It begins by introducing SecureMetric Technology, a company that provides two certification authorities in Malaysia and five in Vietnam. It then discusses what PKI is, including different types like roaming PKI. The document outlines why PKI is important by listing its four trust requirements. It provides examples of real-world PKI implementations in areas like the Malaysian customs department. Emerging trends in mobile PKI and its components in governments, banks and enterprises are also examined. SecureMetric's PKI tokens on display are then highlighted before concluding.
2015 Cybercrime Trends Things are Going to Get InterestingIBM Security
油
What a year 2014 has been for cybercriminals! Its time to take a look back at 2014 and learn whats in store for 2015. How much further will cybercriminals go? What new techniques will we see? What are the main threats we should be wary of in 2015?
From new malware families to PC grade mobile malware, from persistent PC Trojans to cloud based criminal services cybercriminals have been keeping busy with new and advanced techniques.
In this session, IBM Securitys Senior Fraud Prevention Strategist, Etay Maor, will take you through the top stories that made waves in in 2014s cybercrime threat environment and review at the upcoming cybercrime trends for 2015.
We will look some of the biggest (and baddest) in cybercrime innovation, showcasing specific attacks that highlight the ingenuity observed in 2014 and discuss what we can expect in terms of PC and mobile fraud in 2015.
In this presentation, you will learn about:
Latest malware attacks and evasion techniques
How organizations failed to prevent attacks in 2014
Forecast of how recent attacks will affect attacks in 2015
View the full on-demand webcast: https://attendee.gotowebinar.com/recording/4171628843485100290