Draper, UT | June 9, 2021: ProdataKey (PDK), manufacturer of the leading cloud access control platform built for mobile, today announced the release of its new Red 2 Controller, Red Readers, and Red ...
An Apple ID can be the key that unlocks your cloud treasure–but if it’s in the wrong hands, it can allow an interloper to destroy memories and contacts, access your financial information through ...
Faced with an unprecedented threat, federal agencies are looking to lock down the physical compute layer for additional cybersecurity assurance. Alexander Slagg is a freelance writer specializing in ...
Axiado has secured more than $100 million in financing to fund the development of its hardware-based data center security ...
This article originally appeared in the February 2020 issue of Security Business magazine. When sharing, don’t forget to mention @SecBusinessMag! When designing an access control system, it can be ...
A hardware security module (HSM) is a solution that stores cryptographic keys to keep them private while ensuring they are available to those authorized to use them. The primary objective of an HSM ...
Cybersecurity is a critical foundation of our rapidly expanding digital world spanning hardware and software that powers everything from our personal devices to the global infrastructure. Over the ...
MITRE, which publishes a list of top software vulnerabilities in conjunction with US Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), has now published a list ...
The convergence of physical and digital security is driving a shift toward software-driven, open-architecture edge computing. Access control has typically ...
The medical device industry has transformed over the last decade, driven by an explosion in the Internet of Mobile Things and increased connectivity. As complexity around the technology, supply chains ...
With the increasing popularity of bitcoin, ethereum, and other cryptocurrencies, more individuals are looking to expand their digital asset portfolios. As interest grows, selecting the most secure ...