Weaknesses of Biometric Authentication
By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the other end of the wire is more important than ever. The democratization of digital…
Posted in Uncategorized
Tagged Adware, Authentication, Biometric, Breach, cyber attack, Cyber Defense Magazine, cybersecurity, Defense, Hacking, it security, network, technology, UK, vulnerability, Weaknesses
Comments Off on Weaknesses of Biometric Authentication
Multi-Factor Authentication and Mobile Devices
Smart Security Makes Life Easier for Users…and Harder for Hackers By George Brostoff, CEO, SensibleVision Security is as much about deterrence as prevention. From the highest-clearance government servers to the…
Posted in Uncategorized
Tagged Authentication, Breach, Cyber Security, cybersecurity, ddos, hack, Infosec, Iot, it security, Kenya, Linux, Magazine, Multi-Factor, Privacy, Security, vulnerability
Comments Off on Multi-Factor Authentication and Mobile Devices