Security

A Security Playbook for Working from Home

Chances are you are deep in the middle of a remote working scenario that is not of your own creation. The current infectious disease outbreak has sent workforces everywhere scrambling. Employees who have never worked remotely suddenly find themselves dispatched to home offices, IT is under incredible stress, and—as of this writing—it’s hard to predict when we will return to normal.

Hang in there, brave, kindred IT spirit! You’re not alone.

True Crime Stories - Biometrics Brings Justice for the Vulnerable

The follow article contains potentially disturbing references to child abduction and sexual assault.

“Any investigator has that one case they wished they’d finished, and this was mine. I just kept working on it. I wanted to get justice for that girl and her family.”

Taking fingerprints

True Crime Stories: Clues to a Cold Case Brings Closure

When someone is murdered and the killer is never found, the family members of the victim have to live with terrible unanswered questions. It is this distress that motivates people who work in law enforcement to open cold case units. Sometimes advances in technology or further investigation can help solve cold violent crimes, which offers some peace and closure for those family members.

Criminal fingerprint card and magnifier, top view

True Crime Stories - Never Too Late to Reveal a Murderer

68-year-old Sondra Better was finishing her shift at Lu Shay’s Consignment Shop in Delray Beach Florida in August 1998 when a man came into the store and beat her to death. Sondra received several blows to the head before her throat was slashed and she was left on the floor to die.

Sondra was a mother, a grandmother and the cherished wife of her husband Seymour “Zeke” Better. The couple was on the cusp of renewing their vows and celebrating their 50th wedding anniversary. She came to work at the store after retiring in Florida.

5 Reasons Why Using Certificate-Based Security Makes Sense for Your Network

When it comes to running an organization, lots of good things are optional: healthy snacks in the break room, monthly shared birthday parties, chairs with good lumbar support. But some things are anything but optional, and network security is one of them. With data privacy regulations, threats from hackers and unscrupulous competitors, and the simple need to protect your organization's assets and reputation, it's never been more important to find a network security solution that actually delivers on what it claims.

How Polycarbonate is Creating More Secure Passport Datapages

Passport technology is changing from the paper of the past. In the last 15 years, more than 150 countries have moved to a highly secure electronic passport that uses an inlay to support a microcontroller chip. Still, the strongest trend in passports is a polycarbonate (PC) datapage. As of today, more than 40 countries have upgraded their travel documents from the standard paper-and-laminate datapage to a PC one. This technology comes with a few challenges—and many benefits. Let’s take a look at some common questions surrounding PC.

When It Comes to Security Features, Less Is More

Identity documents have come a long way since their introduction in 1414 by King Henry V of England, as part of the Safe Conduct Act. For the next 500 years, various proofs of identity emerged but most people didn't need to carry one. The need to use identity documents not only for identifying but also authenticating the holder of the document became apparent during the first year of World War I with the Lody spy scandal.

Continuous Authentication: Security for an Evolving Threat Landscape

Employees enter login credentials and, once authenticated, gain secure access to valuable network resources and applications. However, requiring users to go through the authentication process only once is turning out to be a risk factor in itself. This process leaves organizations vulnerable to risk every time an employee steps away from their desk, clicks a link, shares a password, or misplaces a mobile phone. If a user authenticates only at login, credential misuse mid-session can go unnoticed.

A Brief History of the Password & Why It Matters



“Success in creating AI would be the biggest event in human history. Unfortunately, it might also be the last, unless we learn how to avoid the risks.”

– Steven Hawking


Personal Background Checks and How To Best Manage Personal Data

Background checks. Governments, corporations, healthcare organizations and financial institutions require them as part of their hiring process. They help identify individuals who have criminal backgrounds and therefore are ineligible for employment. Background checks help organizations reduce their risk, comply with legal requirements, ensure public safety and provide customer assurance.

Pages

Subscribe