AMES, Iowa – A team of computer scientists is working to defend against the next potential cyber risk – cloud storage. Wensheng Zhang, an associate professor of computer science at Iowa State ...
Legacy systems, often based on keyfob or keycard readers, are becoming increasingly redundant. As businesses increasingly migrate to digital platforms, the modern office has become a hotbed of ...
Managing access can be quite a daunting task in mid-to-large sized enterprises. Having a good answer for “Who should have access to what?” is not easy, to say the least. With a myriad of existing ...
The security of any organization's data and systems can often be compromised by seemingly benign entities—third-party contractors, vendors and outsourced service partners. While these external ...
This article originally appeared in Access Control Trends & Technology 2023, a special bonus publication to Security Business magazine, Security Technology Executive, and Locksmith Ledger magazine. In ...
Regtechtimes on MSN
No more moats: Rethinking risk in the age of identity & access
The castle-and-moat cybersecurity strategy might just be as outdated as it sounds. In a world where work happens on phones in airports and laptops in coffee shops, the perimeter is porous by design.
Two new surveys out today show how easy enterprises make it for attackers to steal vast quantities of data with just a few successful breaches of employee machines: Employees typically are given far ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results