Remove 08
Remove 2017 Remove Authentication Remove Government Remove IT
article thumbnail

Reflections on 5 business-changing IT-related trends in 2017

CGI

Reflections on 5 business-changing IT-related trends in 2017. Mon, 01/08/2018 - 03:35. As 2017 has come to an end, we can reflect on how technology continues to change our lives exponentially. Both businesses and government breaches continued to make headlines in 2017. Customer focus shifted to customer experience.

article thumbnail

Making instant payments pay

CGI

Fri, 03/17/2017 - 08:00. As a service brought about by regulation and the government’s desire to improve the efficiency of the country’s payment systems, little attention was paid to its potential uses and impact on the market. Making instant payments pay. harini.kottees…. Take Uber, for example.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Apple Podcasts. Google Podcasts. Spotify Podcasts.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Apple Podcasts. Google Podcasts. Spotify Podcasts.

article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

Listen to EP 08: Hacking Voting Systems. Vamosi: Bowen’s public inquiry revealed findings of multiple buffer overflows, software updates without authentication, and inadequate randomization of the ballots so that valid secrecy can be compromised -- among other vulnerabilities. Apple Podcasts. Google Podcasts. Spotify Podcasts.