Hackers believe it is Easier to Steal Fingerprints than Passwords

Read why Carrie Ann says that hackers believe it is easier to steal fingerprints than passwords on Industry Leader News : With the increase in the use of cyber communication, people started using a password to keep selected data secretive. A password is generally shared between the user and the machine due to which one […]

Network Access Control: Restricting and Monitoring Access to Your Network and Data

Read why Sue Marquette Poremba says that using right network access control can add a new level of cyber security to organisations on eSecurity Planet : The best cybersecurity comes in layers, making it difficult or frustrating for an intruder to fight through each line of defense to break into the network and gain access […]

FIDO Standards Could Complement Government’s Existing Digital Security Protocols

The FIDO Alliance is hoping that the Trump administration will heed its advice in a new white paper outlining how FIDO standards could complement existing digital security protocols in use by the government. It’s a response to last December’s report from the US Commission on Enhancing National Cybersecurity, which advocated for stronger authentication methods beyond the […]

Biometrics and the Internet of Things: Carving a New Future

Read Ruchika Kulkarni explain how biometrics and Internet of Things are carving a new future in cyber and physical security on Read It Quik: Biometrics is a security mechanism that falls back upon knowing “what we are” by identifying a person based on unique physical characteristics such as fingerprints, iris, face etc. It has found […]

Password managers are an essential way to protect yourself from hackers — here’s how they work

Read why Rob Price says that password managers are essential and how they work on Business Insider : If you ask security experts for the simple advice they would give to ordinary people worried about being hacked, the same thing comes up again and again: Don’t reuse passwords. This is because huge numbers of people reuse […]

Gartner: 20% of market to use mobile credentials and cloud-based physical access control by 2020

Two recent reports from Gartner Inc. have the security industry buzzing as they predict a rapid migration to cloud-based physical access control systems (PACS) and mobile credentials. The Predicts 2017 report suggests that by 2020, 20% of organizations will use mobile credentials for physical access in place of traditional ID cards. Read about how 20 percent […]

Mitigate Access Control Attacks

As we know, organizations are prone to data breaches, and even though organizations are becoming serious about their security posture, they are often attacked, and sensitive information (such as passwords) is stolen from their vaults. Read analytical article about how to mitigate access control attacks on Infosec Institute.

Physical security, access control and surveillance moving into 2017

Read Tim Compston’s article about how physical security, access control and surveillance will pan out in 2017 on Security News Desk : On the subject of camera innovations which are making their mark, Jeff Whitney, VP Marketing at Arecont Vision, explains how the US-based business was very much an industry trailblazer when it introduced the […]

20% of organizations will use smartphones in place of traditional physical access cards by 2020: Gartner

In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner, Inc. said that 20 percent of organizations will use smartphones in place of traditional physical access cards. Read about the new report by Gartner which says that nearly 20% organisations will move to smartphone […]

20% organisations to move to smartphones to enable access over physical access cards by 2020: Gartner

A new study by IT consultancy Gartner predicts that 20% of all organisations will use smartphones to enable access to offices in place of traditional physical access cards as compared to less than 5% at present.”A significant fraction of organizations use legacy physical access technologies that are proprietary, closed systems and have limited ability to […]