A No-Compromise Approach to Your Cloud-Based Intranet Security

A No-Compromise Approach to Your Cloud-Based Intranet Security

It’s a well-established fact that companies prefer cloud solutions to on-premises ones when it comes to practically any software. It’s estimated that over 80% of all enterprise workloads will be in the ...
CCPA

Make Digital ID Verification Part of Your CCPA Strategy

As CCPA is poised to take effect, companies must ensure they don’t put personal information in the wrong hands The lines between the digital and physical world are continuing to blur and ...
Security Boulevard
passwords

Considering a World Without Passwords

Every time we sign up at a new website, we have to come up with a unique password. But let’s face it: You probably don’t use more than three unique passwords across ...
Security Boulevard
intelligent security

Using Biometrics, Intelligent Security To Keep Finances Safe

 Fort Knox is no longer the gold standard when it comes to financial security. And with passwords becoming increasingly passé (not to mention an absolute nuisance), a new wave of security solutions ...
Security Boulevard
Biometrics

Biometrics, Facial Recognition, Privacy, Security and the Law

The danger in using biometrics and facial recognition is that they’re not always accurate. A recent article in the L.A. Times indicated that facial recognition software proposed to be used for police ...
Security Boulevard

Biometric Security Data Breach, Critical Windows Vulnerabilities, FBI Data Harvesting

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 82 for August 19th 2019: The BioStar2 biometric security ...

More than a million people have their biometric data exposed in massive security breach

A biometrics system used to secure more than 1.5 million locations around the world - including banks, police forces, and defence companies in the United States, UK, India, Japan, and the UAE ...
Protecting from BioMetric Security Flaws

Protecting from BioMetric Security Flaws

Suprema Security Breach: Protecting Apps from BioMetric Security FlawsCourtesy : MedGadgetWelcome to the world of biometric authentication, where your eyes, ears, and fingerprints are the access code to prove individual identity. Biometric ...
Weak-Kneed Oversight, The Clowns Of Biometric Data Security

Weak-Kneed Oversight, The Clowns Of Biometric Data Security

via superlative reportage from DJ Pangburn, we now learn of the ineptitude of US governmental oversight officials (and the Agencies, Bureaus, Departments, and Branches of Federal Government they service) tasked with protecting ...

Cardiac Biometric

MIT Technology Review is reporting about an infrared laser device that can identify people by their unique cardiac signature at a distance: A new device, developed for the Pentagon after US Special ...
Loading...