OK folks. You are now getting redirected to a new website with a new name, emails sent from a D6 domain, etc. We are the same company, but with a new name. Why the change and what does this mean? This has been in the works for about a year and were waiting for the nod from the US Patent and … [Read more...]
The Physical Security Program Maturity Model
Both physical security and information security have the word “security” in common, but historically, that’s where the similarities stop. However, that’s changing today—and it’s driven by necessity. Some security professionals are getting dragged kicking and screaming into the new era, while others … [Read more...]
Exploiting Full Disk Encryption & How to Mitigate
Full disk-encryption is viewed by some enterprises as a cure all for laptop security. Many organizations have requirements that at least some systems be encrypted – especially those that are used by individuals that might have access to sensitive and/or proprietary information. Taking things a step … [Read more...]
Identification-as-a-Service 101 (IDaas)
The following article was originally written by Terry Gold in RE:ID Magazine for their Spring Issue (Hard Copy). It is meant to share Terry's experience in pioneering the commercial IDaaS market as well as fundamentals and current-state of the market. A detailed research report will be released in … [Read more...]
Replacing Passwords with RFID Cards: A Step Backward
Editor's Note: We have received several requests to post the full version of the paper without requiring a download. If you prefer to read that (includes analysis and supporting concepts), it can be found here. Alternatively, It can be downloaded in PDF by clicking the box at the bottom. While … [Read more...]