BIO-key releases MobileAuth, a touchless biometric authentication app

BIO-key International introduced its new mobile app, BIO-key MobileAuth with PalmPositive the latest among over sixteen strong authentication factors available for BIO-key’s PortalGuard Identity-as-a-Service (IDaaS) platform. MobileAuth’s fast, t… Continue reading BIO-key releases MobileAuth, a touchless biometric authentication app

When the Earth is gone, at least the internet will still be working

The internet is now our nervous system. We are constantly streaming and buying and watching and liking, our brains locked into the global information matrix as one universal and coruscating emanation of thought and emotion. What happens when the machine stops though? It’s a question that E.M. Forster was intensely focused on more than a […] Continue reading When the Earth is gone, at least the internet will still be working

A rush to remote working leaving businesses vulnerable to cybercriminals

The COVID-19 pandemic forced businesses to quickly support remote working practices, often without proper security measures in place. Verizon reveals that many businesses may have left themselves vulnerable and open to cybercriminals in the rush to ens… Continue reading A rush to remote working leaving businesses vulnerable to cybercriminals

68% of construction executives have no cybersecurity measures in place

The construction industry may not appear to be an obvious target for cybercrime, but it garners unwanted online attention just like other sectors. According to a report by IBM, the average cost of a data breach in the industrial sector was $4.99 millio… Continue reading 68% of construction executives have no cybersecurity measures in place

People are the weakest link in data breaches, but can they be held accountable?

In the people-process-technology triad, human error is the top reason for breaches, accounting for 70% of successful attacks, a Cyberinc survey reveals. The next biggest cause is vulnerability management through patches and upgrades, accounting for jus… Continue reading People are the weakest link in data breaches, but can they be held accountable?

IT security budgets to increase over the next 12 months

IT security budgets are spiralling out of control as organizations adapt to the everywhere workplace, an Ivanti survey reveals. 92% of CISOs highlighted the need to deploy additional security measures to better enable and secure employees as they work … Continue reading IT security budgets to increase over the next 12 months