AMES, Iowa – A team of computer scientists is working to defend against the next potential cyber risk – cloud storage. Wensheng Zhang, an associate professor of computer science at Iowa State ...
Legacy systems, often based on keyfob or keycard readers, are becoming increasingly redundant. As businesses increasingly migrate to digital platforms, the modern office has become a hotbed of ...
The security of any organization's data and systems can often be compromised by seemingly benign entities—third-party contractors, vendors and outsourced service partners. While these external ...
Managing access can be quite a daunting task in mid-to-large sized enterprises. Having a good answer for “Who should have access to what?” is not easy, to say the least. With a myriad of existing ...
This article originally appeared in Access Control Trends & Technology 2023, a special bonus publication to Security Business magazine, Security Technology Executive, and Locksmith Ledger magazine. In ...
Two new surveys out today show how easy enterprises make it for attackers to steal vast quantities of data with just a few successful breaches of employee machines: Employees typically are given far ...