Biometrics: Moving Far Beyond Fingerprints

Security used to mean “difficult,” says Phil Dunkelberger, CEO of Nok Nok Labs. It’s easy to see why he thinks this. Organizations have struggled for decades to find security tools that kept out bad guys while admitting authorized persons. This is both a physical security and cybersecurity issue. Read/see the slideshow explaining how Biometrics is […]

Identity management the new ‘perimeter’ for hospital cybersecurity

Read Bill Siwicki’s article about how identity management is the new perimeter for hospital cyber security on Healthcare IT News : Protecting a hospital network’s perimeter used to be the guiding principle for security professionals, but today they must focus more on managing the identities of every user, said John Houston, vice president of information security […]

Securing the Digital Economy With Federated Identity Management

Read Marko Tmusic’s article about how to secure businesses with federated identity management system on Security Intelligence : As the global digital economy grows, the number of digital identities rises, and so does the need to protect and manage how personal information is collected, used and distributed. Managing digital identities is key in the online world […]

What is the Cost of Doing Nothing?

Hospitals and clinics face regular threats to people and property from both outside and inside forces. Physical assaults, infant abductions, theft of medical supplies, drugs, or confidential patient information are all issues with which today’s healthcare security professionals must contend. Read why doing nothing to solve physical identity and access management challenges is an easy […]

Mature Access Management Curtails Breaches

Enterprise security is failing, and one culprit is immature identity and access management (IAM), according to a new study, “Stop the Breach: Reduce the Likelihood of an Attack Through an IAM Maturity Model,” which was conducted for Centrify by Forrester Consulting. In 2016, the report states, hackers compromised more than 1 billion identities. Read/see the […]

Hackers believe it is Easier to Steal Fingerprints than Passwords

Read why Carrie Ann says that hackers believe it is easier to steal fingerprints than passwords on Industry Leader News : With the increase in the use of cyber communication, people started using a password to keep selected data secretive. A password is generally shared between the user and the machine due to which one […]

Network Access Control: Restricting and Monitoring Access to Your Network and Data

Read why Sue Marquette Poremba says that using right network access control can add a new level of cyber security to organisations on eSecurity Planet : The best cybersecurity comes in layers, making it difficult or frustrating for an intruder to fight through each line of defense to break into the network and gain access […]

FIDO Standards Could Complement Government’s Existing Digital Security Protocols

The FIDO Alliance is hoping that the Trump administration will heed its advice in a new white paper outlining how FIDO standards could complement existing digital security protocols in use by the government. It’s a response to last December’s report from the US Commission on Enhancing National Cybersecurity, which advocated for stronger authentication methods beyond the […]

Biometrics and the Internet of Things: Carving a New Future

Read Ruchika Kulkarni explain how biometrics and Internet of Things are carving a new future in cyber and physical security on Read It Quik: Biometrics is a security mechanism that falls back upon knowing “what we are” by identifying a person based on unique physical characteristics such as fingerprints, iris, face etc. It has found […]

Password managers are an essential way to protect yourself from hackers — here’s how they work

Read why Rob Price says that password managers are essential and how they work on Business Insider : If you ask security experts for the simple advice they would give to ordinary people worried about being hacked, the same thing comes up again and again: Don’t reuse passwords. This is because huge numbers of people reuse […]