Access Control News, Features, and Interviews


The week in security: Malware-laden apps persist as iOS 9 zero-day scores $1m bounty

Launches of numerous new security tools, from a range of vendors, suggested that we are in a time of strong security innovation. Some of that innovation is also coming from open-source vendors like security specialists Kustodian, who have eschewed commercial solutions and gone open source-only to improve their value proposition and target companies like SMEs, who struggle to boost security without a lot of money to spend.

David Braue | 09 Nov | Read more

Qld crime inquiry recommends police “infiltrate” online drug gangs, boost penalties for crims using Dark Web

Criminals who use the Internet for drug crimes, fail to provide their passwords to police or use online anonymising services for child exploitation, would attract additional sentences under a host of Queensland Organised Crime Commission of Inquiry (QOCCI) recommendations that also include suggestions that the Queensland Police Service (QPS) train cybercrime investigators to monitor and “infiltrate” the online drug trade.

David Braue | 06 Nov | Read more

More Access Control news


Check Point and Sygate corral end points

At their core, Check Point Integrity and Sygate Enterprise Protection are effectively policy-based firewalls. That's the cake. The icing is their capability to monitor other applications for compliance with configuration requirements and send errant machines to quarantine until they can be updated with the latest anti-virus definitions, Windows patches, or other necessities.

Victor Garza | 28 Dec | Read more

More Access Control reviews


More Access Control slideshows


Cloud Computing Poses Control Issues for IT

Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.

Kevin Fogarty | 18 May | Read more

How security professionals monitor their kids

Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your kids. Who are they talking to? What are they talking about? Are they going where they said they are going?

Joan Goodchild | 15 Apr | Read more

What Are the Most Overrated Security Technologies?

The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?

Bill Brenner | 25 Mar | Read more

Biometrics: What, Where and Why

Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems.

Mary Brandel | 25 Mar | Read more

More Access Control features


Ten tips to secure client VPNs

If you have given your trusted employees and key contractors remote access to your network via a client virtual private network (VPN), congratulations! By now, you have seen the productivity and cost benefits from allowing collaboration that surmounts geographical separation.

Martin Heller | 03 Oct | Read more

More Access Control tutorials


Workarounds: 5 ways employees try to access restricted sites

There may have been a time when blocking certain sites was acceptable in most office environments. But what was once considered off-limits is now essential in many organizations. Social media sites like Facebook are a major part of many companies' marketing strategy. Sites like YouTube present opportunities to share information about products or services visually. And IM and chat services like G-chat are free and efficient ways for employees to communicate.

Joan Goodchild | 12 Aug | Read more

More Access Control guides


Best ways to protect Ecommerce site from cyber criminals

With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.

Joy Mali | 20 Mar | Read more

Strange account management at Amazon

Via the RISKS mailing list comes an interesting tale of poor online account management at a major online retailer. According to Graham Bennett, accounts with Amazon display an odd behaviour that doesn't seem to have attracted much attention in the past.

Carl Jongsma | 09 Oct | Read more

Five lessons learned about computer security

Reformed hacker-turned-security-consultant Kevin Mitnick served five years in federal prison for breaking into phone and software company networks. He talks about his past hacking exploits, computer security, and how he turned an illegal hobby into a useful career.

Jarina D'Auria | 16 Jul | Read more

More Access Control opinons

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place