What is access control? 5 enforcement challenges security professionals need to know

Who should access your company’s data? How do you make sure those who attempt access have actually been granted that access? Under which circumstances do you deny access to a user with access privileges? To effectively protect your data, your organization’s access control policy must address these (and other) questions. In order to help you […]

Poor security habits are the ideal recipe for a breach

A Preempt survey of more than 200 employees (management level or above) from enterprise companies of 1000 or more people, found that businesses are left exposed by employees who have more access to sensitive resources than they should and who follow poor security habits. Read about latest survey by Preempt which reveals that 25 percent of […]

The 10 misconceptions of using a policy-based approach for access control

Read Niklas Jakobsson list top ten misconceptions that businesses have while using policy-based approach for access control on Help Net Security : The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a highly flexible system for administering access based on […]

Biometric Security Comes with Unique Advantages, Concerns

Read Brian Nearing’s article about the pros and cons of biometric security on Govt Tech : This spring, a popular Queensbury amusement park offered its customers a choice — use a membership pass with their photo on it, or switch to a new pass based on a scan of their fingerprint. Read his full article […]

Preventing Credential Theft: A Security Checklist for Boards

Read Rinki Sethi’s checklist for company boards to prevent credential thefts on Dark Reading : Within any organization, certain employees have access to information that could tip the scales of risk for the business. If a cybercriminal were to gain access to a company’s most sensitive information through stealing credentials from one of these employees, […]

Improve Healthcare Authentication with New NIST Guide

NIST recently released updated digital identity guidelines for federal agencies looking to create a secure authentication process. While not designed for healthcare authentication specifically, the guidelines could help the industry ensure a more secure password process. Read about the newly updated digital identity guidelines for healthcare firms by NIST on Health IT Security.

Four types of security entrance for solutions that truly fulfill security goals

Read Greg Schreiber four types of security entrance solutions for access management on Source Security : Security and systems integrators across the nation are recommending and providing long-term security solutions to their customers. But when it comes to physical security entrances, integrators can easily fall into the trap of simply fulfilling an end user’s exact request […]

Hackers Say Privileged User Credentials Favorite Way to Get Your Data

One third of hackers said that a privileged access account is the easiest way to steal your data, according to a survey conducted by Thycotic at this year’s Black Hat conference. I’m surprised it was only a third of hackers who said this, considering that once you have someone’s credentials, you pretty much have the […]

Authentication and IT Ecosystem: Leveraging Data from Multiple Sources

Read  Jason Oeltjen’s article about how companies can leverage data for access management on CSO Online : Your immediate IT ecosystem is just one part of the broader IT ecosystem – and therefore just one source of information that can be used to authenticate identities and grant access to systems. Read his full article here.

Shoring up security in enterprise AV

Kieran Walsh, senior technical solutions manager at Audinate outlines the top vulnerabilities in today’s enterprise AV systems. The top vulnerabilities in an AV system are very similar in a lot of ways to any other system (IT or otherwise). A general concept of security is “Access, Authentication and Auditing.”+ Read Kieran Walsh of Audinate explain the top […]