Access Control

Access Control

The multiple breaches and deficiencies in European security structures exposed in the Paris attacks throw a light on the Union’s unpreparedness for the threats...

Daniel Ehrenreich Supervisory Control and Data Acquisition (SCADA) experts are well aware that there is no single measure ("no silver bullet") that provides absolute cyber...

  In another baffling outburst, Republican presidential hopeful Donald Trump has announced he wants to close “the Internet up in some way,” in order to...

Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...

Encrypted communications specialist Silent Circle said that in the wake of the Paris terrorist attacks,  it was tightening access to its mobile apps and secure smartphone...

The UEFA European Football Championship is one of the world’s most prestigious football tournaments, second only to the World Cup. The competition is held...

Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...

When the whole world is using the cloud, it comes as little surprise that even the most secured sectors will end up using it...

Daniel Ehrenreich Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...

Governments all around the world have had to put up with the dark side of the ever-growing extensive use of social media. Although the...

The shooting in Umpqua Community College in Roseburg, Ore. at the beginning of October ended with nine dead. Two more shootings about a week...

A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...

Between August 1, 2014 and July 31, 2015, the Defense Department addressed 93 of 229 cyber recommendations, according to a summary of a new...

Voice biometrics is based on the assumption that each person has a unique voice that depends not only on his or her physiological features...

By ARIE EGOZI   Reality has a way to deal with Hypocrisy and stupidity. It simply puts the facts in your face and you have to...

Amidst all the excitement about the possible benefits of the Internet of Things, a slew of warnings have been sounded by IT pros, vendors...

Croatia closes seven of the eight road crossings after 11,000 people, who were turned away from Hungary, flooded into the country in a matter...

In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...

In light of numerous cyber attacks and security breaches, of which the attack on the American Office of Personnel Management (OPM) was perhaps the...

The GPS (Global Positioning System) is a navigation tool that supplies positioning data and guiding maps to a target point. Not only us drivers...

China is planning to set up "cybersecurity police stations” at major internet companies and for websites so authorities can move more quickly against illegal online...

Mounted laptops have been standard operating equipment in police cruisers since the mid-90s. However, more police departments now are considering tablets for improved connectivity...