Please turn on your JavaScript for this page to function normally.
zero
Six steps for implementing zero trust access

Modern organizations are no longer governed by fixed perimeters. In fact, the perimeter-based security model is disintegrating in a world where users work on their own devices …

crowd
Security and compliance gaps of ineffective employee onboarding and offboarding

There are significant gaps in the compliant management of employee resources throughout the employment lifecycle. Just 15% of employees have all the resources they require to …

AWS
How data breaches forced Amazon to update S3 bucket security

Amazon launched its Simple Storage Service (better known as S3) back in 2006 as a platform for storing just about any type of data under the sun. Since then, S3 buckets have …

trend
A look at the global network access control market

The network access market reached a valuation of ~ $953 million in 2018, according to Fact.MR. The continuous evolution of information security parameters is likely to warrant …

building
Is your organization getting physical security right?

For most organizations (and especially for tech companies), the physical security of data centers and headquarters is of the utmost importance. As Tim Roberts, a senior …

stairs
Six best practices to follow in access control

Finding the right access control for your organization is best done in stages. In this way, you’ll be able to foresee costs and activities that you must tackle both on …

Gargoyle
Gargoyle: Innovative solution for preventing insider attacks

A group of researchers from UNSW Sydney, Macquarie University, and Purdue University has released a paper on a new and very promising network-based solution for preventing …

fingerprint
How the access control market has developed and should direct itself in the coming years

Smart cards have become synonymous with the access control market, continuing to be used across a variety of end markets including, healthcare, warehousing and storage, …

earth
Global security trends for 2018: GDPR, identity and access security

In its third annual global IT security survey, Versasec found Europe’s General Data Protection Regulation (GDPR) is impacting security planning around the world, smart …

cloud storage
Scanned IDs of 119,000 FedEx customers exposed online

An unsecured Amazon Web Services bucket holding personal information and scans of IDs of some 119,000 US and international citizens has been found sitting online by Kromtech …

access
The 10 misconceptions of using a policy-based approach for access control

The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a …

tunnel
Are you employees snooping on the corporate network?

The overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major snooping problem among today’s workforce. …

Don't miss

Cybersecurity news