SM2019

|SM2019

About SM2019

This author has not yet filled in any details.
So far SM2019 has created 4 blog entries.
3 06, 2019

Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

By |2019-06-28T16:19:34+08:00June 3rd, 2019|Article|Comments Off on Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

With Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework expected coming into effect in June 2019, financial institutions now have more reasons than ever to protect the integrity of their network infrastructure. In order to achieve this protection, you’ll need a robust system in place to manage your PKI and certificate lifecycles. With the [...]

17 05, 2019

Pros and Cons of FIDO authentication

By |2019-06-28T16:25:49+08:00May 17th, 2019|Article|Comments Off on Pros and Cons of FIDO authentication

Introduction to FIDO Authentication Once devices could store data and could provide access to various services digitally, there arose a need to safeguard such devices and services from unauthorized, unintended uses. This need for increased security led to a variety of methods that are intended to authenticate users of digital platforms and storage devices. Known [...]

17 05, 2019

What is FIDO U2F and how does it work?

By |2019-06-28T16:27:49+08:00May 17th, 2019|Article|Comments Off on What is FIDO U2F and how does it work?

The FIDO Alliance started as an answer to the security problems of typical username/password login procedures. Passwords are viewed as not very secure in the current age of digital security. Despite this, there have been a few barriers to the adoption of different and better authentication services. In the past, consumers did not enjoy their [...]

17 05, 2019

5 Important Facts To Kick Start Your Understanding On PKI

By |2019-06-28T16:35:16+08:00May 17th, 2019|Article|Comments Off on 5 Important Facts To Kick Start Your Understanding On PKI

As defined in Wikipedia, a public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store & revoke digital certificates and manage public-key encryption. Hence, PKI is not just the software which is a misconception of most people when it comes to understanding the real pain behind [...]