Access Control

Three ways live face identification systems can tackle social issues

I wrote this blog with help from my colleague Alexis Camarillo. Spoilers ahead! If you haven’t seen the film ‘Coco’,…

Read More »

Jewelry to unlock an iPhone or authenticate a digital payment

As biometrics are replacing the passwords and pins, a company has come up with jewelry which has an embedded fingerprint…

Read More »

How to achieve out-of-the box global IoT connectivity

The IoT world is developing at a tremendous pace, but while Cisco estimates that there will be more than 50…

Read More »

Why Ethical Hackers have an essential part to play in protecting enterprise data from cybersecurity threats

The beginning of October sees the start of Cyber Security Awareness Month, a collaborative effort between governments and industry to…

Read More »

The evolution of smart cities: what provisions are vital for their success?

Cities are undergoing a wave of digital transformation. With rapid population growth and urbanization transforming the way we live, improving…

Read More »

How to Quickly Recover After a Third-Party Data Breach

I write all the time about how to prevent ransomware attacks and how the root cause in so many cases…

Read More »

Three developments helping to increase trust in the commercial drone ecosystem

In recent years, vast leaps forward in drone technology have helped to confirm their practical application in a variety of…

Read More »

Social Engineering Attacks: Common Methods Involved and How to Avoid Being Caught Out

In 2004, the Department of Homeland Security and the National Cyber Security Alliance launched National Cyber Security Awareness Month as…

Read More »

PAM vs. VPAM … What’s the Difference?

Privileged Access Management (PAM) is a newer technology within the Identity and Access Management (IAM) space that focuses on applying…

Read More »
Back to top button
Close