It’s time to face a stark reality: Threat actors will soon gain access to artificial intelligence (AI) tools that will enable them to defeat multiple forms of authentication — from passwords to biometric security systems and even facial recognition software — identify targets on networks and evade detection. And they’ll…
Read More
With Apple’s introduction of iOS 12 for all their supported mobile devices came a powerful new utility for automation of common tasks called Siri Shortcuts. This new feature can be enabled via third-party developers in their apps, or custom built by users downloading the shortcuts app from the app store.…
Read More
The security industry is fast-paced, no doubt about it. Those who are called to the profession must be quick-witted, focused, ready to change at any moment and maybe even a little bit fearless. They must also be able to forge strong, trust-filled relationships quickly. Teams who have mastered these skills…
Read More
Co-authored by Fabrizio Petriconi. In the ever-expanding digital ecosystem, having secure and efficient access to resources is critical to both using and delivering services. But if you’re a gatekeeper managing a large number of identities and resources, your primary concern is who has access and how that access is being…
Read More