Email Alerts
-
What are good features to look for in access control software?
When supporting environments with HID card readers and proxy cards, what qualities should control access software have? Identity and access management expert Joel Dubin weighs in on software and implementation best practices. Ask the Expert
-
What is the purpose of RFID identification?
RFID identification can be used to keep track of everything from credit cards to livestock. But what security risks are involved? Ask the Expert
-
How secure is online banking today?
Most banks take the security of their online services seriously. In this expert Q&A, Michael Cobb explains why online banking is relatively safe -- with the exception of one particular mistake. Ask the Expert
-
How are biometric signatures more than a fingerprint scanner?
How secure are biometric signatures, and what's the best way to keep them from being defeated? Identity and access management expert Joel Dubin explains. Ask the Expert
-
What is the best way to administer exams to students via computer?
Security pro Mike Rothman discuses the risks associated with implementing computer examinations and offers tips on the best ways to securely offer these types of tests. Ask the Expert
-
Traditional single sign-on (SSO) products versus federated identities
Identity management and access control expert Joel Dubin discusses the pros and cons of single sign-on products and federated identities. Ask the Expert
-
How do anonymous credentials and selective disclosure certificates affect enterprise IAM?
In this expert response, security pro Joel Dubin defines anonymous credentials and selective disclosure certificates, explains how they work and unveils how these two factors can affect enterprise IAM. Ask the Expert
-
What are the pros and cons of using keystroke dynamic-based authentication systems?
In this SearchSecurity.com Q&A, security pro Joel Dubin discusses the positive and negative aspects of using keystroke dynamic-based authentication systems. Ask the Expert
-
Is it safe to use remote access tools to grant system access?
In this SearchSecurity.com Q&A, security expert Joel Dubin discusses remote access tools and examines whether or not these products can have negative effects. Ask the Expert
-
Is there any policy or regulation to help protect biometric data?
In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin examines how authentication credentials, such as biometric data, are in need of more protection from current regulations such as SOX, GLBA and HIPAA. Ask the Expert
Security Management Strategies for the CIO