|SM2019

About SM2019

This author has not yet filled in any details.
So far SM2019 has created 4 blog entries.
3 06, 2019

Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

By |2019-09-11T12:31:39+08:00June 3rd, 2019|Article|Comments Off on Compliance with Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework

update: This post had been updated on 11/09/2019 (dd/mm/yyyy) With Bank Negara Malaysia’s Risk Management in Technology (RMiT) framework coming into effect in 18July2019 , financial institutions now have more reasons than ever to protect the integrity of their network infrastructure. In order to achieve this protection, you’ll need a robust system in place to [...]

17 05, 2019

Pros and Cons of FIDO authentication

By |2019-09-10T02:10:41+08:00May 17th, 2019|Article SEO Knowledge sharing|Comments Off on Pros and Cons of FIDO authentication

Introduction to FIDO Authentication Once devices could store data and could provide access to various services digitally, there arose a need to safeguard such devices and services from unauthorized, unintended uses. This need for increased security led to a variety of methods that are intended to authenticate users of digital platforms and storage devices. Known [...]

17 05, 2019

What is FIDO U2F and how does it work?

By |2019-06-28T16:27:49+08:00May 17th, 2019|Article|Comments Off on What is FIDO U2F and how does it work?

The FIDO Alliance started as an answer to the security problems of typical username/password login procedures. Passwords are viewed as not very secure in the current age of digital security. Despite this, there have been a few barriers to the adoption of different and better authentication services. In the past, consumers did not enjoy their [...]

17 05, 2019

5 Important Facts To Kick Start Your Understanding On PKI

By |2019-06-28T16:35:16+08:00May 17th, 2019|Article|Comments Off on 5 Important Facts To Kick Start Your Understanding On PKI

As defined in Wikipedia, a public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store & revoke digital certificates and manage public-key encryption. Hence, PKI is not just the software which is a misconception of most people when it comes to understanding the real pain behind [...]