Top

Category: Access control


Access control

Who Am I? Best Practices for Next-Gen Authentication

November 16, 2017

Via: Dark Reading

By their very nature, antiquated, static identifiers like Social Security numbers and dates of birth are worse than passwords. There is no ignoring it: our financial security is compromised daily. Many security professionals reading this wouldn’t hesitate to recount all […]


Access control, Mobile

Apple’s Face ID can be quickly disabled in an emergency

September 18, 2017

Via: Help Net Security

A week ago, Apple debuted iPhone X and Face ID, a new biometric security mechanism that replaces Touch ID. Face ID allows users to unlock their iPhone with their face. The same mechanism can also be used to make purchases […]


Access control

Charting Your Identity Governance and Administration Adoption Road Map

August 16, 2017

Via: Security Intelligence

We’ve witnessed almost a decade of identity governance and administration (IAG) disasters. In my experience implementing identity and access management (IAM) solutions for Fortune 100 companies around the world, I’ve seen my fair share of challenges. I’ve been called in to help […]


Access control

The ABCs of Identity Management

August 10, 2017

Via: CSO Online

What is identity management? Broadly speaking, identity management systems (also known as identity and access management, or IAM, systems) enable the administration of individual identities within a system, such as a company, a network or even a country. More specifically, ID […]


Access control

3 Keys to Easier Multi-Factor Authentication for Everyone

August 4, 2017

Via: CSO Online

Multi-factor authentication (MFA) is a great tool for keeping cyber attackers out of your data. But using it successfully can be a balancing act between making it hard for attackers to get in and making MFA easy for users and […]


Access control

Why Is Identity Governance So Difficult to Get Right?

August 1, 2017

Via: Security Intelligence

When was the last time you heard an identity governance and administration (IGA) success story? If you’re thinking “not in my organization,” you’re in good company. IGA projects have a reputation for being hard to complete, drawn out and costly. But […]


Access control, Privacy protection

3 Ways to Keep Your Data Private When You’re in Public

July 21, 2017

Via: CSO Online

Public Wi-Fi has made it easier than ever to be productive no matter where you are – at the airport, in a coffee shop and, in some communities, even just sitting on a park bench. But that productivity can come […]


Access control, Data loss

Two-factor via your mobile phone – should you stop using it?

July 12, 2017

Via: Naked Security

Our friends over at The Register just documented yet another real-world example of a cybercrime known as SIM swapping. In its most up-front form, here’s the sort of thing that happens. A crook walks into a mobile phone shop, lets himself get talked […]


Access control

The future of payments: sensor fingerprinting, facial recognition, retinal scanning and voice control

July 12, 2017

Via: Help Net Security

Viewpost surveyed a cross-section of 1,000 U.S.-based consumers, finding that overall, 80 percent of Americans are in support of payments technologies and currencies, including tools like sensor fingerprinting, facial recognition, retinal scanning and voice control, as well as currencies like […]


Access control, Cloud security

Securing your Cloud Stack from Ransomware

July 12, 2017

Via: Dark Reading

For enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack. These different layers create multiple potential targets, and for the informed, they each represent a […]