The Latest in IT Security

Posts Tagged ‘access control’

The posited pattern matching capabilities of quantum computing may have a couple of different applications in access control. Biometrics would likely benefit from improved abilities to match and compare. At the moment we don’t actually compare, for example, the fingerprint originally registered with the fingerprint presented. Biometric matching must be done on the basis of […]

Read more ...

Even though the U.S. hasn’t suffered an attack to manufacturing, power production or public transit, the risk is growing. Indeed, the number of IC-related cybersecurity incidents reported to U.S. authorities rose 20 percent in the last year. ICS solutions and protocols were originally designed to work within isolated environments. They monitor and control industrial processes […]

Read more ...

Even as financial institutions move to shore up ATM security with biometric mechanisms, cyber-crooks are busy figuring out ways to beat them. Biometric identifiers like fingerprints, palm veins, voice, and the iris have long been considered as offering the most secure way to authenticate an individual’s identity. But that may be changing. Security firm Kaspersky […]

Read more ...


Categories

WEDNESDAY, MARCH 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments