Three key components to ensure a safe and secure campus by dissecting the core fundamental DETER.
- By Toby Heath
- Sep 08, 2014
Richard Biever talks strong authentication, two-factor authentication, YubiKey, user feedback and working with Yubico.
Enhanced Non-Lethal (ENL) devices can play a vital role in managing more common types of violence on campus.
- By Paul Hughes
- Aug 25, 2014
Sending a wrong email can lead to massive privacy breaches which could inflict penalties or fines, or even loss of revenue.
- By Eitan Bremler
- Aug 18, 2014
Acquire data to recognize where the issues are and then create a system to train employees to avoid risk.
- By Danny Garrido
- Aug 11, 2014
Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.
- By Jason Dover
- Aug 05, 2014
A look at public space surveillance on either side of the Atlantic highlights how it came of age.
- By David Aindow
- Jul 28, 2014
Huge component in protecting critical infrastructure from being high-risk terrorist targets is by properly managing the identities of those getting into and out of secured zones.
- By Daniel W. Krantz
- Jul 22, 2014
6 steps on predicting the future of your network's security: process, enhance, cross-correlate, baseline and analyze information.
- By Benjamin Powell
- Jul 14, 2014
As retail continues to expand the scope of its security administration to prepare for security breaches, IT managers must extend down to the rack level.
- By Steve Spatig
- Jul 07, 2014
In theory, IoT is a great concept; it all boils down to ease of use vs security. Which is more important?
- By Allan Pratt
- Jul 01, 2014
Crime doesn't discriminate against size; small businesses are typically most vulnerable with fewer resources to guard against it.
- By Scott McNulty
- Jun 17, 2014
ID cards evolve from bar code to magnetic stripe to proximity to smart card and finally to the biometric card.
- By Kim Humborstad
- Jun 10, 2014
In a world where security measures are always changing, but to date, have failed to keep our identities safe, what is the best way to keep our personal material truly secure?
- By Hector Hoyos
- Jun 03, 2014
Streamlining the process to ensure a smooth transition whether a full-scale migration or just moving small amounts of data.
- By Sara Gates
- May 30, 2014
Understanding the difference and likenesses between data privacy, information security and confidentiality provides a rich tool set to protect information as long as the proper protection paradigm is applied.
- By Michelle Dennedy , Jonathan Fox , Thomas Finneran
- May 23, 2014
Solution should provide remote monitoring capabilities to control access within a facility and audit trail capabilities to demonstrate compliance with HIPAA requirements.
- By Steve Spatig
- May 20, 2014
A well-designed, solidly-engineered access control system is fundamental to any security strategy, especially if it is backward compatible with an open architecture.
- By Robert Laughlin
- May 14, 2014
Banks worldwide are putting biometrics at the front end using fingerprint authentication.
- By Bill Spence
- May 05, 2014
When pursuing malware prevention solutions for your customers, it is key to look at solutions that not only prevent the malware, but also focus on removing the malware. Customers will continue to browse to specific sites and access infected content, whether they know they are doing it or not. Because of this, it’s critical to have both a solution that can continue to remove malicious content as well as alert users to potentially suspicious web sites.
- By Eileen Turner
- Apr 25, 2014