Authentication technology startup Plurilock Security Solutions Inc. today announced it has landed a contract with the U.S. Department of Homeland Security to do further development on its advanced ...
Operator identity is often a missing link in manufacturing data. To optimize plant processes, manufacturers need to know not only what machines and materials were used and at what times, but also who ...
Somehow I'm managed to navigate the whitepapers and all the good/bad advice out there with relatively little hassle have a working WPA/802.1x/PEAP implementation against an IAS server in our AD. I've ...
Behavior recognition is a powerful tool, helping to establish that people who request access to business applications or services are in fact who they say they are. When someone attempts to sign in ...
Hush Security emerges from stealth to eliminate risks, burdens of static machine authentication keys
How can an enterprise, large or small, ensure that all the software and services it relies upon are communicating securely with one another? The standard for roughly the last quarter century — much of ...
In my last column for CIO.com, I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. Among other things, I advocated that in this ...
SAN FRANCISCO--(BUSINESS WIRE)--Okta, Inc. (NASDAQ:OKTA), the leading independent provider of identity for the enterprise, today at Oktane19 announced new risk-based authentication that leverages ...
LAWRENCE, Kan.--(BUSINESS WIRE)--Cobalt Iron Inc., a leading provider of SaaS-based enterprise data protection, today announced that it has been granted a patent on its technology for machine learning ...
Industry 4.0 revolves around data, particularly through the Industrial Internet of Things (IoT), which enables manufacturers to track various metrics throughout the production cycle meticulously.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results