Top

Category: Access control


Access control, Security

The end of Net Neutrality: the sky is not falling

January 5, 2018

Via: CIO

There was much ado in the media and political world recently about the Federal Communications Commission’s 3-2 vote to end the Obama administration’s two-year-old policy of “Net Neutrality” – that Internet service providers must enable access to all content and […]


Access control, Security

Behavioral biometrics will replace passwords by 2022

January 4, 2018

Via: Hot for Security

In just a few years, we can all safely forget those cumbersome passwords we use to secure and unlock our devices. And we will be able to thank on-device artificial intelligence (AI) for easing the strain on our memory, according […]


Access control, Network security, Vulnerabilities

Advanced Deception: How It Works & Why Attackers Hate It

December 19, 2017

Via: Dark Reading

While cyberattacks continue to grow, deception-based technology is providing accurate and scalable detection and response to in-network threats. Distributed deception platforms have grown well beyond basic honeypot trapping techniques and are designed for high-interaction deceptions, early detection, and analysis of […]


Access control, Hacker, Virus & Malware

Leaky Windows 10 password manager allows hackers to steal your data

December 18, 2017

Via: Hot for Security

A noted Google developer has discovered a troubling flaw in a popular password manager that Windows 10 installs by default. Hackers could get their hands on user passwords via clickjacking and/or malicious code-injection techniques. Google Project Zero researcher Tavis Ormandy […]


Access control, Network security, Security

Balancing Enterprise Security and User Access: 6 Points to Keep in Mind

December 15, 2017

Via: CIO

The balancing act that CIOs and CSOs must perform to keep the enterprise secures a delicate one – guarding corporate assets from both internal and external malicious threats, while also giving all users secure access to data, anytime, anywhere, from any device.What’s more, […]


Access control

Who Am I? Best Practices for Next-Gen Authentication

November 16, 2017

Via: Dark Reading

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords. There is no ignoring it: our financial security is compromised daily. Many security professionals reading this wouldn’t hesitate to recount all […]


Access control, Mobile

Apple’s Face ID can be quickly disabled in an emergency

September 18, 2017

Via: Help Net Security

A week ago, Apple debuted iPhone X and Face ID, a new biometric security mechanism that replaces Touch ID. Face ID allows users to unlock their iPhone with their face. The same mechanism can also be used to make purchases […]


Access control

Charting Your Identity Governance and Administration Adoption Road Map

August 16, 2017

Via: Security Intelligence

We’ve witnessed almost a decade of identity governance and administration (IAG) disasters. In my experience implementing identity and access management (IAM) solutions for Fortune 100 companies around the world, I’ve seen my fair share of challenges. I’ve been called in to help […]


Access control

The ABCs of Identity Management

August 10, 2017

Via: CSO Online

What is identity management? Broadly speaking, identity management systems (also known as identity and access management, or IAM, systems) enable the administration of individual identities within a system, such as a company, a network or even a country. More specifically, ID […]


Access control

3 Keys to Easier Multi-Factor Authentication for Everyone

August 4, 2017

Via: CSO Online

Multi-factor authentication (MFA) is a great tool for keeping cyber attackers out of your data. But using it successfully can be a balancing act between making it hard for attackers to get in and making MFA easy for users and […]