Marrying access control to wearable technology will vastly improve user experience while boosting security, says Brivo Labs.
Brivo Labs was into wearable technology long before wearable technology was cool.
"The lanyard with an access control card on it is a wearable, so we've been in it for years," said Lee Odess, general manager … more »
When version 3.0 of the Payment Card Industry Data Security Standards becomes mandatory next month, merchants may need to make some changes.
Crowdstrike CTO Dmitri Alperovitch explains how his company's newest Falcon platform improves security with detection and prevention.
Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.
Recent social engineering attacks involving Dridex malware illustrate the importance of paying attention to older and infrequently used attack vectors.
Thorough documentation and clear communication can make dealing with a data breach a little less painful.
Big Data has rendered older security models largely obsolete. The all-in-one product approach that once served the industry well is now inadequate.