Great security depends on the ability to know who is authorized and who is not. This applies to both physical and digital security. But how do you accomplish this? Increasingly, one answer is facial recognition, which is improving rapidly thanks to artificial intelligence (AI) and related technologies. Hundreds of thousands…
Read More
This is the second installment in a three-part series. Be sure to read part one and stay tuned for part three to learn more. Partnering with a new fraud protection and authentication vendor can seem overwhelming. You may be asking yourself, “Where do I start?” or, “How will my team…
Read More
In June 2019, a study on mobile app vulnerabilities presented some incredible and worrisome findings. Most notably, high-risk vulnerabilities were found in 43 percent of mobile apps for Android and 38 percent for iOS, according to Positive Technologies. Now, consider this: In terms of market share, per IDC, Android owns…
Read More
When it comes to cloud computing, contract terminations can occur for a number of reasons. Due diligence requires companies to lay out an exit plan for what happens if a cloud provider does not work out as expected. When a cloud vendor relationship eventually ends — and they always do…
Read More