NFC Who’s at the Door
[RevK] wanted to learn about NFC readers, and we agree that the best way to do so is to dive in and build one yourself. There are readers available from …read more Continue reading NFC Who’s at the Door
Collaborate Disseminate
[RevK] wanted to learn about NFC readers, and we agree that the best way to do so is to dive in and build one yourself. There are readers available from …read more Continue reading NFC Who’s at the Door
Organizations have many challenges when it comes to cybersecurity, and one that is top of mind for many is striking the right balance between the usability of data and upholding the proper security of that data. The truth is, for most employees, securi… Continue reading 3 tips for balancing data security and usability
The challenge of maintaining security across different offices, projects and systems can be daunting. Many businesses develop a patchwork of tools and procedures, often applied retroactively, that’s difficult to keep updated and typically involves a l… Continue reading Designing and Building a Security Architecture
We are a small tech startup. Currently, we have the entire codebase hosted in a private GitHub repository. Is this a good solution going forward (as we’re planning to expand the team rapidly) or should we shift it to something more secure?… Continue reading How to secure my organisations codebase?
Smart cities should, ideally, work as a well-oiled clock, but we’re still far, far away from that. First of all, smart cities are still being built, one siloed segment at a time, and it will take decades to set up a well-functioning, harmonious w… Continue reading Data sharing in a smart city: Choosing the right approach
Context
On macOS, when an app requests permission to access a keychain item, a prompt like this is presented:
git-credential-osxkeychain wants to use your confidential information stored in "github.com" in your keychain. The au… Continue reading Determine path of app prompting for access to macOS keychain item
As security professionals, we have acknowledged for over a decade that our data resides outside our network. Yet, we still talk about strategies for protecting the enterprise vs cloud infrastructure, or access management for branch offices vs remote wo… Continue reading Can zero trust kill our need to talk about locations?
I’m assuming instead of saying "forgot password?" the text would say "lost your key?" or "don’t have your device?". But what would the process of secondary access look like in the future when passwords are ..a… Continue reading What is the equivalent of "forgot password" in password-less login applications using FIDO2 / Webauthn or later?
I’m assuming instead of saying "forgot password?" the text would say "lost your key?" or "don’t have your device?". But what would the process of secondary access look like in the future when passwords are ..a… Continue reading What is the equivalent of "forgot password" in password-less login applications using FIDO2 / Webauthn or later?
I’m dealing with a system which users will access from multiple devices, with potentially different components of the system being used via each device.
For example, a user may be accessing component A and B on device 1, but only component… Continue reading Multiple accounts per user for different devices