Attribute based access control provides a dynamic level of access control, based on the environment and conditions, needed for privacy and data protection.
With six million Instagram accounts hacked, are passwords now a liability and is it time to turn on that Instagram two-factor authentication?
We look at the ease of use, reliability and strength of Apple's iPhone X new Face ID security feature. Should you keep your face (password) to yourself?
For decades smart cards have been the foundation of access control and security systems. In smart cities, smart cards will play a key multiapplication role across public and private sector services.
Reddit hack shows that the industry standard two-factor authentication approach in certain cases might not offer as much protection of vulnerable data as has long been thought.
California is now leading the charge to beef up the cyber security features of connected devices by banning weak passwords, forcing device manufacturers to supply a unique password or force a password change on startup.
Millennials, a tech-savvy bunch often on the go, tend to kick caution to the curb when it comes to protecting personal information as growing up with technology often creates a false sense of security.
CCPA pioneered a strong mandate for data privacy and security in the US, and now SB-327 is focusing on securing IoT devices. However, an opportunity was missed to ditch passwords altogether and advocate for a stronger method of authentication.
By protecting machine-to-machine communication using machine identity protection, you can help stop many insider threats and a wide variety of other security threats, before they can damage your network and your company as a whole.
Honeypots set up by Sophos logged a staggering amount of scripted attacks attempting to pass default credentials. What’s more alarming is the aggressive speed and scale of these attempts with the first attack in less than 60 seconds.