Security

Continuous Authentication: Security for an Evolving Threat Landscape

Employees enter login credentials and, once authenticated, gain secure access to valuable network resources and applications. However, requiring users to go through the authentication process only once is turning out to be a risk factor in itself. This process leaves organizations vulnerable to risk every time an employee steps away from their desk, clicks a link, shares a password, or misplaces a mobile phone. If a user authenticates only at login, credential misuse mid-session can go unnoticed.

A Brief History of the Password & Why It Matters



“Success in creating AI would be the biggest event in human history. Unfortunately, it might also be the last, unless we learn how to avoid the risks.”

– Steven Hawking


Personal Background Checks and How To Best Manage Personal Data

Background checks. Governments, corporations, healthcare organizations and financial institutions require them as part of their hiring process. They help identify individuals who have criminal backgrounds and therefore are ineligible for employment. Background checks help organizations reduce their risk, comply with legal requirements, ensure public safety and provide customer assurance.

Protecting Biometrics at Rest, an Essential Tutorial

Biometric authentication is fast and convenient. Touch your phone and it is unlocked. Look through an iris scanner and enter a secure room. Speak into your phone for hands-free authentication. Governments, law enforcement, airports, and corporations use it. However, is biometric authentication that simple? Not really when you consider the policy issues, privacy concerns, and complexity of biometric data protection.

Many Small Steps to Enhanced Passport Security

The real value of security components

A huge number of people cross borders every hour, many of them by air. If you consult flight radar apps, where one can follow every airplane currently in the air, air traffic is sometimes so heavy that you are not even able to spot a patch of sky amongst flight paths. It is estimated by the International Aviation Trade Association (IATA) that the number of travelers will double in the next twenty years. The world is becoming a smaller place.

Four Questions to Ask Your Identity and Access Management Vendor

Strong identity and access management (IAM) is vital to securing your business against cyber attacks, thwarting social engineering attempts and stopping hackers from stealing credentials. You need a solution that provides robust authentication and authorization, balanced with ease of use, to secure your sensitive data and systems.

With so many IAM solutions on the market, how do you choose the right one for your business?

Inline Personalization Simplifies College ID Issuance

Smart Schools are Seeing the Benefits of Smart Cards

Creating Trusted Identities Starts with Trusting Your IAM Vendor

Finding the right identity and access management (IAM) solution can be a challenge. With dozens of vendors and products in the marketplace, how do you pick the right one? The following is a guide to help you identify the unique needs, challenges and various factors in your organization to consider when selecting the perfect IAM solution and vendor to meet your security goals.

Multi-Factor Authentication and Single Sign-On Explained

The simple combination of a user ID and password is no longer good enough to protect our most vulnerable information. Identity theft, data breaches, malware, and malicious actors mean that digital security must evolve to stay one step ahead of security threats.

Strong, reliable security in a modern government, non-profit, SMB, or enterprise environment isn’t just important today; it's mandatory.

The best security must take into account the needs of the organization and the employee, balancing protection, encryption, and ease-of-use.

Augmented Reality — The Physical Access Control Game Changer

What is it?

Wikipedia defines Augmented Reality (AR) as, “an interactive experience of a real-world environment where the objects that reside in the real-world are ‘augmented’ by computer-generated perceptual information, sometimes across multiple sensory modalities, including visual, auditory, haptic, somatosensory, and olfactory.”

More simply put, AR technology superimposes a computer-generated image onto a user's view of the real world using cameras and screens such as those built into your mobile phone or tablet.

Pages

Subscribe