Category: Access Control

Jewelry to unlock an iPhone or authenticate a digital payment
Access Control, biometrics

Jewelry to unlock an iPhone or authenticate a digital payment

As biometrics are replacing the passwords and pins, a company has come up with jewelry which has an embedded fingerprint used to authenticate a digital ... Read More

How to achieve out-of-the box global IoT connectivity
Access Control, cyber

How to achieve out-of-the box global IoT connectivity

The IoT world is developing at a tremendous pace, but while Cisco estimates that there will be more than 50 billion connected devices by 2020 ... Read More

Why Ethical Hackers have an essential part to play in protecting enterprise data from cybersecurity threats
Access Control, cyber

Why Ethical Hackers have an essential part to play in protecting enterprise data from cybersecurity threats

The beginning of October sees the start of Cyber Security Awareness Month, a collaborative effort between governments and industry to raise awareness about the importance ... Read More

The evolution of smart cities: what provisions are vital for their success?
Access Control, cyber

The evolution of smart cities: what provisions are vital for their success?

Cities are undergoing a wave of digital transformation. With rapid population growth and urbanization transforming the way we live, improving or even maintaining our current ... Read More

How to Quickly Recover After a Third-Party Data Breach
Access Control, Backup

How to Quickly Recover After a Third-Party Data Breach

I write all the time about how to prevent ransomware attacks and how the root cause in so many cases is an improperly secured third-party ... Read More

Three developments helping to increase trust in the commercial drone ecosystem
Access Control, cyber

Three developments helping to increase trust in the commercial drone ecosystem

In recent years, vast leaps forward in drone technology have helped to confirm their practical application in a variety of different environments. In times of ... Read More

Social Engineering Attacks: Common Methods Involved and How to Avoid Being Caught Out
Access Control, cyber

Social Engineering Attacks: Common Methods Involved and How to Avoid Being Caught Out

In 2004, the Department of Homeland Security and the National Cyber Security Alliance launched National Cyber Security Awareness Month as a broad effort to help ... Read More

PAM vs. VPAM … What’s the Difference?
Access Control, cyber

PAM vs. VPAM … What’s the Difference?

Privileged Access Management (PAM) is a newer technology within the Identity and Access Management (IAM) space that focuses on applying additional controls and protections on ... Read More

Top digital security tips from our Just Ask Gemalto experts that can help you stay safe online
Access Control, cyber

Top digital security tips from our Just Ask Gemalto experts that can help you stay safe online

With technology moving into more areas of our lives than ever before, understanding how to protect your online data has never been more important. However, ... Read More