All
News
Blog

RNS - PDMR Change

26 April 2018

Read More

RNS - Director/PDMR Shareholding

25 April 2018

Read More

RNS - PDMR Change

20 April 2018

Read More

Intercede Combats Corporate Data Breaches by Extending Strong Identity Beyond Smart Cards

Intercede, the software and service company specializing in identity, credential management and secure mobility, has launched a new Derived Credentials solution backed by Intel® Authenticate. The solution - which aims to combat corporate data breaches - will be included in the revision of the National Institute of Standards and Technology’s (NIST) National...

Read More

RNS - Notification of Major Interest in Shares

11 April 2018

Read More

RNS - Appointment of Chief Executive

11 April 2018

Read More

RNS - Receipt of $4.0m Order / Trading Update

4 April 2018

Read More

RNS - Board Changes

29 March 2018

Read More

RNS Reach - New Contract Award

9 March 2018

Read More

RNS - New Contract Award

13 February 2018

Read More

Intercede’s Derived PIV Credential Solution

BYOD has become the new normal for many enterprises in recent years – even extending to normal practice within government agencies. Although convenient, the practice risks compromising structural security. At worst, there is a risk to critical national assets whose integrity, given the advances in cyber-espionage, has recently become the subject of...

Read More

RNS - New Contract Award

4 December 2017 

Read More

RNS - New Contract Award

30 November 2017 

Read More

RNS – Interim Results 2017

27 November 2017 

Read More

RNS - Trading Update

6 November 2017

Read More

RNS - Share Award

26 October 2017

Read More

RNS - Trading Update

5 October 2017

Read More

US credit reporting company Equifax suffers huge data breach

Another day, another high-profile data breach crippling another high-profile organisation.

Read More

Intercede partners with Citrix to offer MyID to XenMobile customers

Cybersecurity expert Intercede today announced that it is teaming up with Citrix, a leader in digital workspaces, to offer Intercede’s MyID technology, which is now Citrix Ready®, to XenMobile customers. The MyID platform and XenMobile provide the derived credentials required to enable secure enrollment of devices into the corporate XenMobile UEM...

Read More

Intercede in the News: TSB to roll out Iris Scanning Tech

High street bank TSB is set to roll out iris-scanning technology as a means of logging into online banking - but is it secure?

Read More

UK Parliament cyber-attack - our thoughts

July 12th, 2017

Perhaps unsurprisingly given the volume of high-profile stories filling the headlines currently, you may have missed this story. For us at Intercede, however, it stuck out like a sore thumb.

Read More

Clef Shutdown

7th July 2017

Today marks the day Clef two-factor authentication finally shuts down for good. Many of the people who used it up to now will be left without a secure method of accessing their WordPress websites.

Read More

Intercede in the News: The Importance of Safeguarding the Future of IoT - Richard Parris

23rd May, 2017

We’re probably all familiar with Gartner’s much-quoted forecast that, by 2020, there will be 20 billion connected devices in operation globally. As this prediction looks set to become a reality, it’s clear that the connections between people, places and things have never been closer, faster or more numerous than they are today.

Read More

Intercede in the News: HSBC voice recognition security system duped by customer's twin brother

22nd May, 2017

HSBC's much-touted voice recognition software, used by half a million customers to verify their identity and secure their bank accounts, has successfully been duped by the brother of one of its customers.

Read More

Intercede in the News: Financial IT April/May

15th May, 2017

Take a look at what Intercede's PSD2 Initiative Director, Rory Gray, had to say in this month's issue of Financial IT: 'Securing the Success of PSD2.'

Read More

Intercede in the News: Are you prepared for the PSD2 game changer?

5th May, 2017

The growing number of cyber-attacks and fraudulent activity in the financial services industry indicates a substantial need to improve methods of authorising electronic transactions, protect consumers against fraud and maintain customer trust. The rapid uptake of mobile payments has exposed a bigger attack surface for criminal activity and...

Read More

Intercede in the News: Preparing for PSD2

28th April, 2017

Mobile banking and online payments have revolutionised the finance sector, but strict industry regulations and security concerns have slowed any major changes. This is set to change in January 2018, when the revised Payments Services Directive (PSD2) comes into force. Rory Gray, PSD2 Initiative Director at Intercede, looks at why financial...

Read More

Intercede in the News: Smart spies and how to secure the IoT future

20th April, 2017

Both Cisco and Ericsson forecast there will be approximately 50 billion connected devices in operation globally by 2020. Whatever the exact figure, we can predict one certainty: IoT will play an increasingly dominant role in our lives, redefining them as we know it.

Read More

Intercede in the News: Intercede And Centrify Ditch The Password

Read More

Imagination and Intercede demonstrate the power of the Trust Continuum in securing the IoT

14th March, 2017

Joint initiative addresses consumer security risk driven by today’s on-demand economy

Read More

MWC Post-Mortem - Connected and Self-Driving Cars

5th March, 2017

With the dust settling on MWC for another year, one lingering question might be  ‘when did MWC turn into The Barcelona Motor Show?’  At first sight it may have seemed jarring to see so many cars proudly being shown off at the show; in fact, it makes a lot of sense when you consider that more cars were connected to mobile networks than phones...

Read More

Connected Cars and Threat Landscapes

"If somebody wants to interfere with a car today then generally they have to go to the car itself. But as soon as it's a connected they can be anywhere in the world – your threat landscape is quite significantly different and the opportunity for a hack is much higher” said Intercede’s Chief Innovations Officer, Nick Cook, quoted in a recent BBC comment on...

Read More

Intercede on GSA Schedule 70 and SEWP V

Intercede are pleased to announce that our technology is now available for purchase through the GSA Schedule 70 and SEWP V Government contract vehicles via the ImmixGroup®. All US federal government agencies, quasi-federal agencies, and government contractors purchasing in support of government funded work and state and local governments can purchase from...

Read More

Lock down your login

Today marks the launch of a campaign dear to our hearts here at Intercede - in collaboration with the White House, the US National Cyber Security Alliance (NCSA) and more than 34 other companies and NGOs, we're proud to announce our support of Lock Down Your Login, a campaign to encourage people to secure their online accounts.

Read More

Yahoo confirms the biggest data breach ever - half a billion accounts compromised in 2014

News that over 500 million Yahoo user accounts were hacked in 2014 - "the world's biggest known cyber breach by far" - has emerged this morning. Despite the unparalleled scope of this breach, Intercede CEO Richard Parris is far from shocked:

Read More

Jury-rigged and hanging by a thread: how passwords have survived so long

Born at the Massachusetts Institute of Technology in 1961, predating the internet itself and the most commonly used form of identity protection, the password has long served as the most prevalent way to authenticate users and secure their data. Over the years though, it has become an unwelcome and dangerous relic from a bygone age.

Read More

Office for National Statistics releases crime report

Last week, the Office for National Statistics released some sobering crime stats for the year ending March 2016.  For the first year, and not before time, cybercrime has been included in the survey; worryingly this has nearly doubled the total of all crime incidents recorded. There were 5.8 million cybercrimes from 2015-16, which means one in ten adults in...

Read More

Check out the most common passwords of 2015... Oh dear

Earlier this year, SplashData released their list of the most commonly used passwords. The list includes a few old favourites - '123456' and 'password' still hold the top spots, but features a few surprises. 'Football' is on the rise at number 7 (up 3 places from last year), with new arrivals 'princess' and 'starwars' making their debut on the list. To...

Read More
Load More

RNS - PDMR Change

26 April 2018

Read More

RNS - Director/PDMR Shareholding

25 April 2018

Read More

RNS - PDMR Change

20 April 2018

Read More

RNS - Notification of Major Interest in Shares

11 April 2018

Read More

RNS - Appointment of Chief Executive

11 April 2018

Read More

RNS - Receipt of $4.0m Order / Trading Update

4 April 2018

Read More

RNS - Board Changes

29 March 2018

Read More

RNS Reach - New Contract Award

9 March 2018

Read More

RNS - New Contract Award

13 February 2018

Read More

RNS - New Contract Award

4 December 2017 

Read More

RNS - New Contract Award

30 November 2017 

Read More

RNS – Interim Results 2017

27 November 2017 

Read More

RNS - Trading Update

6 November 2017

Read More

RNS - Share Award

26 October 2017

Read More

RNS - Trading Update

5 October 2017

Read More

Intercede in the News: TSB to roll out Iris Scanning Tech

High street bank TSB is set to roll out iris-scanning technology as a means of logging into online banking - but is it secure?

Read More

Intercede in the News: The Importance of Safeguarding the Future of IoT - Richard Parris

23rd May, 2017

We’re probably all familiar with Gartner’s much-quoted forecast that, by 2020, there will be 20 billion connected devices in operation globally. As this prediction looks set to become a reality, it’s clear that the connections between people, places and things have never been closer, faster or more numerous than they are today.

Read More

Intercede in the News: HSBC voice recognition security system duped by customer's twin brother

22nd May, 2017

HSBC's much-touted voice recognition software, used by half a million customers to verify their identity and secure their bank accounts, has successfully been duped by the brother of one of its customers.

Read More

Intercede in the News: Financial IT April/May

15th May, 2017

Take a look at what Intercede's PSD2 Initiative Director, Rory Gray, had to say in this month's issue of Financial IT: 'Securing the Success of PSD2.'

Read More

Intercede in the News: Are you prepared for the PSD2 game changer?

5th May, 2017

The growing number of cyber-attacks and fraudulent activity in the financial services industry indicates a substantial need to improve methods of authorising electronic transactions, protect consumers against fraud and maintain customer trust. The rapid uptake of mobile payments has exposed a bigger attack surface for criminal activity and...

Read More

Intercede in the News: Preparing for PSD2

28th April, 2017

Mobile banking and online payments have revolutionised the finance sector, but strict industry regulations and security concerns have slowed any major changes. This is set to change in January 2018, when the revised Payments Services Directive (PSD2) comes into force. Rory Gray, PSD2 Initiative Director at Intercede, looks at why financial...

Read More

Intercede in the News: Smart spies and how to secure the IoT future

20th April, 2017

Both Cisco and Ericsson forecast there will be approximately 50 billion connected devices in operation globally by 2020. Whatever the exact figure, we can predict one certainty: IoT will play an increasingly dominant role in our lives, redefining them as we know it.

Read More

Intercede in the News: Intercede And Centrify Ditch The Password

Read More
Load More

Intercede Combats Corporate Data Breaches by Extending Strong Identity Beyond Smart Cards

Intercede, the software and service company specializing in identity, credential management and secure mobility, has launched a new Derived Credentials solution backed by Intel® Authenticate. The solution - which aims to combat corporate data breaches - will be included in the revision of the National Institute of Standards and Technology’s (NIST) National...

Read More

Intercede’s Derived PIV Credential Solution

BYOD has become the new normal for many enterprises in recent years – even extending to normal practice within government agencies. Although convenient, the practice risks compromising structural security. At worst, there is a risk to critical national assets whose integrity, given the advances in cyber-espionage, has recently become the subject of...

Read More

US credit reporting company Equifax suffers huge data breach

Another day, another high-profile data breach crippling another high-profile organisation.

Read More

Intercede partners with Citrix to offer MyID to XenMobile customers

Cybersecurity expert Intercede today announced that it is teaming up with Citrix, a leader in digital workspaces, to offer Intercede’s MyID technology, which is now Citrix Ready®, to XenMobile customers. The MyID platform and XenMobile provide the derived credentials required to enable secure enrollment of devices into the corporate XenMobile UEM...

Read More

UK Parliament cyber-attack - our thoughts

July 12th, 2017

Perhaps unsurprisingly given the volume of high-profile stories filling the headlines currently, you may have missed this story. For us at Intercede, however, it stuck out like a sore thumb.

Read More

Clef Shutdown

7th July 2017

Today marks the day Clef two-factor authentication finally shuts down for good. Many of the people who used it up to now will be left without a secure method of accessing their WordPress websites.

Read More

Imagination and Intercede demonstrate the power of the Trust Continuum in securing the IoT

14th March, 2017

Joint initiative addresses consumer security risk driven by today’s on-demand economy

Read More

MWC Post-Mortem - Connected and Self-Driving Cars

5th March, 2017

With the dust settling on MWC for another year, one lingering question might be  ‘when did MWC turn into The Barcelona Motor Show?’  At first sight it may have seemed jarring to see so many cars proudly being shown off at the show; in fact, it makes a lot of sense when you consider that more cars were connected to mobile networks than phones...

Read More

Connected Cars and Threat Landscapes

"If somebody wants to interfere with a car today then generally they have to go to the car itself. But as soon as it's a connected they can be anywhere in the world – your threat landscape is quite significantly different and the opportunity for a hack is much higher” said Intercede’s Chief Innovations Officer, Nick Cook, quoted in a recent BBC comment on...

Read More

Intercede on GSA Schedule 70 and SEWP V

Intercede are pleased to announce that our technology is now available for purchase through the GSA Schedule 70 and SEWP V Government contract vehicles via the ImmixGroup®. All US federal government agencies, quasi-federal agencies, and government contractors purchasing in support of government funded work and state and local governments can purchase from...

Read More

Lock down your login

Today marks the launch of a campaign dear to our hearts here at Intercede - in collaboration with the White House, the US National Cyber Security Alliance (NCSA) and more than 34 other companies and NGOs, we're proud to announce our support of Lock Down Your Login, a campaign to encourage people to secure their online accounts.

Read More

Yahoo confirms the biggest data breach ever - half a billion accounts compromised in 2014

News that over 500 million Yahoo user accounts were hacked in 2014 - "the world's biggest known cyber breach by far" - has emerged this morning. Despite the unparalleled scope of this breach, Intercede CEO Richard Parris is far from shocked:

Read More

Jury-rigged and hanging by a thread: how passwords have survived so long

Born at the Massachusetts Institute of Technology in 1961, predating the internet itself and the most commonly used form of identity protection, the password has long served as the most prevalent way to authenticate users and secure their data. Over the years though, it has become an unwelcome and dangerous relic from a bygone age.

Read More

Office for National Statistics releases crime report

Last week, the Office for National Statistics released some sobering crime stats for the year ending March 2016.  For the first year, and not before time, cybercrime has been included in the survey; worryingly this has nearly doubled the total of all crime incidents recorded. There were 5.8 million cybercrimes from 2015-16, which means one in ten adults in...

Read More

Check out the most common passwords of 2015... Oh dear

Earlier this year, SplashData released their list of the most commonly used passwords. The list includes a few old favourites - '123456' and 'password' still hold the top spots, but features a few surprises. 'Football' is on the rise at number 7 (up 3 places from last year), with new arrivals 'princess' and 'starwars' making their debut on the list. To...

Read More

Intercede hits the headlines responding to Zuckerberg's Social Media Hack.

Following the news of Facebook founder Mark Zuckerberg's hacking problem, Richard Parris, Intercede Chairman and CEO has responded with some sobering words on the vulnerability of usernames and passwords...

Read More

7 cybersecurity predictions for 2016

By Allen Storey, Chief Product Officer

With 2015 now behind us, here at Intercede we thought we’d kick-off the New Year with a look into the future, at the cybersecurity trends we’re expecting to emerge in 2016:

Read More

Establishing digital trust in a connected world

By Chris Edwards, Chief Technical Officer, Intercede

The Intercede event at The Shard on Tuesday 24 November brought together some interesting perspectives on the subject of trust within the context of an increasingly connected world.

Read More

Utilizing multi-TEE trusted application management for securing the IoT

It’s clear that mobile and IoT devices need to be protected from scalable software attacks.  Vendors and OEMs have responded to these growing threats by building in hardware security features that can provide the basis for integrity and confidentiality in systems.  However it has been challenging for service providers to access and make use of this...

Read More

Working with Intel to deliver a more secure and convenient alternative to passwords

Enterprises are finally accepting that passwords are no longer an adequate form of protection against opportunistic cybercriminals, and are instead looking for stronger alternatives.

Read More

Working with NIST and Microsoft to Advance Secure Credential Management on Mobile Devices

The multiple security breaches that have rocked the foundation of the U.S. Government prove that multi-factor authentication needs to be implemented as a universal standard. The next big challenge in a proactive approach to cybersecurity is mobile devices.

Read More

Enterprising UK at the forefront of cyber security

The RSA Conference has grown significantly in size and stature in recent years, fuelled by the news of seemingly endless security breaches and the real effects being felt by business leaders across the world. With such a laser-like focus on security issues, events such as RSA have become must-attend affairs for enterprises and public sector organisations...

Read More

Intercede achieves Cyber Essentials PLUS Accreditation

The UK government now require all suppliers bidding for certain sensitive contracts to be certified against an industry-supported scheme called the Cyber Essentials scheme. This scheme enables organisations to demonstrate that they are able to protect themselves against common cyber attacks whilst adhering to a government-endorsed standard.

Read More

MyTAM service protects app users from hackers

I have just returned from Mobile World Congress in Barcelona, where we were showcasing our MyTAM solution, and I can honestly say that there was never a quiet moment! Developers are really keen to secure their Android apps by using the TEE to protect their customers and valuable end user data.

Read More

Simple password list illustrates the limitations of the system

The list of the most used passwords of 2014, made up of very predictable combinations, illustrates the inherent limitations of the username/password system and lax security habits that endanger consumers’ valuable digital assets. In Intercede’s study The Rise of the Identity Centric Economy, these poor habits were painfully illustrated, with 60% of UK...

Read More

Securing the connected vehicle

The connected vehicle is one of the most frequently cited and potentially most valuable uses of the Internet of Things. However, it brings with it the potential for severe consequences should security systems be unable to mitigate any cyber threats. It is essential that vehicle components can trust each other and that only the driver or autonomous driving...

Read More

Identity is the real key to the digital world

The digital economy now marches in double time, led by non-stop technological development and the increasing power, functionality and convenience of the devices used to access the online environment. We can now turn our heating on or off with our smartphone, transfer funds across the world at the touch of a button and access company information in our home...

Read More

Secure access on the go using derived PIV credentials

Meeting the required technical and business process standards to achieve FIPS 201-2 compliance, and combining technology independence with an easy ‘mobile first’ self-service interface, MyID enables fast enterprise-wide deployment of derived credentials at the lowest total cost of ownership.

Read More

There’s nothing smart about insecure connected devices…

The Internet of Things is increasingly touted as the next big thing: at the Microsoft World Partner Conference in Washington earlier this month it was described as ‘the Internet of Your Things’. Taking its capabilities to the biggest extension, it has the potential to be the equivalent of the Industrial Revolution for the 21st century.

Read More

2014 Microsoft World Partner Conference

The Conference is now on, with more than 16,000 attendees on Day 1.

Read More
Load More