Adding Smartphones to Enterprise Access Management
The smartphone is both one of the most widely proliferated tools in the enterprise, and one of the most troublesome. It’s a safe bet that
The smartphone is both one of the most widely proliferated tools in the enterprise, and one of the most troublesome. It’s a safe bet that
The rapid evolution in mobile technology has allowed manufacturers to integrate new biometrics sensors into almost every device over the last few years. Though Samsung
From identity fraud to massive hacks, cybercrime is evolving at a rapid pace, but so is the technology we use to protect ourselves, like biometrics. Learn more in The Weekly Cypher.
Businesses have been struggling to cope with the introduction of mobile devices to the workplace since the introduction of the BlackBerry. From controlling what to
The Weekly Cypher looks at new security policies that target hacking and improved authentication to help protect the nation’s infrastructure, personal devices, and more.
We all use Software-as-a-Service (SaaS), whether it’s for work or in our personal lives. From Dropbox to Salesforce, cloud services have been replacing their offline
On the heels of Mobile World Congress, March has been designated mobile biometrics month. There are numerous innovations in mobile technology and how it enables
Learn more about the news from MWC and what’s going on in biometrics and cybersecurity, and the need for strong authentication in today’s Weekly Cypher.
Security experts have been warning against the use of SHA-1 for years. The aging cryptography algorithm was an initial foray into hash-based security. The second
In this week’s “Cypher” we look at developments in mobile biometric technologies and how they are enabling advanced authentication in a number of industries.
The concept of the modern computer was invented in the 1940s, with the first supercomputer built in the 1960s to perform larger scale computations that
As this year’s RSA Conference winds down we look at the news coming out of the event and what’s going on elsewhere in cybersecurity.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.