Top

Category: Access control


Access control, Privacy protection

3 Ways to Keep Your Data Private When You’re in Public

July 21, 2017

Via: CSO Online

Public Wi-Fi has made it easier than ever to be productive no matter where you are – at the airport, in a coffee shop and, in some communities, even just sitting on a park bench. But that productivity can come […]


Access control, Data loss

Two-factor via your mobile phone – should you stop using it?

July 12, 2017

Via: Naked Security

Our friends over at The Register just documented yet another real-world example of a cybercrime known as SIM swapping. In its most up-front form, here’s the sort of thing that happens. A crook walks into a mobile phone shop, lets himself get talked […]


Access control

The future of payments: sensor fingerprinting, facial recognition, retinal scanning and voice control

July 12, 2017

Via: Help Net Security

Viewpost surveyed a cross-section of 1,000 U.S.-based consumers, finding that overall, 80 percent of Americans are in support of payments technologies and currencies, including tools like sensor fingerprinting, facial recognition, retinal scanning and voice control, as well as currencies like […]


Access control, Cloud security

Securing your Cloud Stack from Ransomware

July 12, 2017

Via: Dark Reading

For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack. These different layers create multiple potential targets, and for the informed, they each represent a […]


Access control

4 Key Identity and Access Management Priorities and Investment Drivers

July 7, 2017

Via: CSO Online

What drives your decisions around identity and access management (IAM)? According to the 2016 IDC Global Identity Management Assessment Survey, if you’re looking at an IAM solution, you’re likely most interested in one of four things: how effective a solution is, […]


Access control

Current Trends in Identity and Access Management: July 2017

July 5, 2017

Via: Security Intelligence

Identity and access management (IAM) is a mature and well understood domain of security. That doesn’t mean it’s static. While IAM is commonly associated with security — indeed, it is an essential part of a holistic security program — many […]


Access control

Watch out: don’t lose your passwords when you sign up online

June 28, 2017

Via: Naked Security

Who would have thought that by providing registration information on one site, you could make other online accounts vulnerable? That’s exactly what Dr Nethanel Gelernter and other researchers at the Israeli College of Management Academic Studies demonstrated via their paper […]


Access control

How to spot and prevent insider threats

June 28, 2017

Via: CSO Online

In June, Netherlands-based web hosting provider Verelox had to completely shut down its services, preventing customers from accessing their data and virtual servers. Was this another example of ransomware? An outside hacker up to mischief? Nope. The company’s headaches were […]


Access control

The 6 best password managers

June 15, 2017

Via: CSO Online

Thanks to the continuous barrage of high-profile computer security scares and reports of cloud-scale government snooping, more of us internet users are wising up about the security of our information. One of the smarter moves we can make to protect […]


Access control

The best identity management advice right now

June 12, 2017

Via: CSO Online

Identity is the only security boundary that has ever mattered in computer security defense. Physical boundaries, firewall boundaries, security domains, forests, realms and virtual networks… none of those matter if a single logon credential that can access multiple domains is […]