access control
![building](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094642/building-400x200.jpg)
Is your organization getting physical security right?
For most organizations (and especially for tech companies), the physical security of data centers and headquarters is of the utmost importance. As Tim Roberts, a senior …
![stairs](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103038/stairs-400x200.jpeg)
Six best practices to follow in access control
Finding the right access control for your organization is best done in stages. In this way, you’ll be able to foresee costs and activities that you must tackle both on …
![Gargoyle](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100549/gargoyle-400x200.jpg)
Gargoyle: Innovative solution for preventing insider attacks
A group of researchers from UNSW Sydney, Macquarie University, and Purdue University has released a paper on a new and very promising network-based solution for preventing …
![fingerprint](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112928/fingerprint-400x200.jpg)
How the access control market has developed and should direct itself in the coming years
Smart cards have become synonymous with the access control market, continuing to be used across a variety of end markets including, healthcare, warehousing and storage, …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101712/earth-400x200.jpeg)
Global security trends for 2018: GDPR, identity and access security
In its third annual global IT security survey, Versasec found Europe’s General Data Protection Regulation (GDPR) is impacting security planning around the world, smart …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
Scanned IDs of 119,000 FedEx customers exposed online
An unsecured Amazon Web Services bucket holding personal information and scans of IDs of some 119,000 US and international citizens has been found sitting online by Kromtech …
![access](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102841/access-400x200.jpg)
The 10 misconceptions of using a policy-based approach for access control
The principle of Attribute Based Access Control (ABAC) has existed for many years. It’s the evolution from simple access control lists and role-based access control, to a …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112722/tunnel-400x200.jpg)
Are you employees snooping on the corporate network?
The overwhelming majority of employees are deliberately seeking out information they are not permitted to access, exposing a major snooping problem among today’s workforce. …
![map](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103122/map-connect-400x200.jpg)
Addressing security concerns around connected ecosystems
The convergence of IoT applications with emerging technologies such as artificial intelligence, Big Data, and context-aware computing could help address current security …
![world](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105959/world-400x200.jpg)
Living in an Assume Breach world
Some security professionals claim their networks are secure from hacking. They may say this to justify a recent large purchase of security equipment. But many times, they say …
![smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105531/smartphone-400x200.jpg)
Organizations to gradually replace physical access cards with smartphones
In 2016, less than 5 percent of organizations used smartphones to enable access to offices and other premises. By 2020, Gartner said that 20 percent of organizations will use …
![User key](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195246/user-key-400x200.jpg)
Improving business intelligence: The key catalyst is governance
While Business Intelligence (BI) is yielding important benefits for the vast majority of surveyed companies, most feel there is more to come, according to Qlik and Forbes …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege