Access Control — Features

Cloud Computing Poses Control Issues for IT

Though most U.S. companies still list customer and other corporate information as their most valuable assets, many keep pushing this data farther from safe lockdown in the data center--and are about to give it another strong shove in that direction.

Kevin Fogarty | 18 May | Read more

How security professionals monitor their kids

Cell phones, texting, IM, email, Facebook, MySpace--kids are interconnected today in ways hardly imagined two decades ago. But these technology-based communication platforms also enable new forms of an age-old parenting strategy: monitoring your kids. Who are they talking to? What are they talking about? Are they going where they said they are going?

Joan Goodchild | 15 Apr | Read more

What Are the Most Overrated Security Technologies?

The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools ever really useful to begin with?

Bill Brenner | 25 Mar | Read more

Biometrics: What, Where and Why

Biometrics encompasses a variety of methods for ensuring identity based on physical or behavioral traits. Conventional identifying traits include fingerprints, face topology, iris structure, hand geometry, vein structure, voice, signature and keystroke recognition. Emerging technologies analyze characteristics such as gait, odor, and ear shape. Rather than being used in isolation, biometrics systems are increasingly becoming multimodal, an approach that serves both to increase security and overcome failure-to-enroll problems.

Mary Brandel | 25 Mar | Read more

Port of Los Angeles Fights Crime Fighting With Mobile Video

The Project: Deploy mobile communications software to enable transmission of live video to and from the Port of Los Angeles' control centers and harbor police in the field. The project is part of a $4.2 million integrated command console system designed to improve security responsiveness at the nation's busiest cargo port.

Stephanie Overby | 28 Jan | Read more

Social Engineering: The Fine Art of BS, Face to Face

Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.

Joan Goodchild | 08 Jun | Read more

Social Engineering: 5 Security Holes at the Office

If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?

Joan Goodchild | 10 Jun | Read more

Virtualization security: protecting unique IP

Moving to a nearly fully-virtualized infrastructure in 2008 made Joel Braverman a lot more confident in both the physical and digital IT infrastructure at his (relatively new) employer Universal Audio. As manager of IT and the guy responsible for security on that infrastructure-one that supports a company whose products are both expensive and almost entirely digital-it also made him extremely nervous, he says.

Kevin Fogarty | 04 Jun | Read more

Your Identity: 'Costanza Style'

Your identity is like George Costanza's wallet. Really. Think about it. Do you remember the classic Seinfeld episode? The one where George wouldn't give up his ever-expanding wallet filled with store credit cards, Irish money, a coupon for an Orlando Exxon gas station and several Sweet and Low packets. This, in spite of the obvious physical pain it caused and the security threat all of that imposed.

David Miller | 11 Feb | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place