Latest postings by Michael Seese
Employees probably are most fascinated by the cool, “sexy” tools like firewalls and biometric systems. If you are offering training, y ...more>>
There are three ways to authenticate that a user has legitimate access to a system: A password, which is something that you know;A token, wh ...more>>
For most of us in America, some time during 2007 the process for accessing
our online bank or brokerage account changed. Perhaps we were ...more>>
Biometrics are the wave of the future for access control. Everything you’ve seen about placing your eye up to a scanner to read the bloo ...more>>
Years ago, the only guys who carried swipe cards were the government officials and top-secret scientists who used them to access the undergr ...more>>
The average person doesn’t immediately think of physical controls as information security measures. But if I don’t want you to steal m ...more>>
Sciences such as engineering, physics, and medicine have been around for centuries. Even so, these disciplines still see advances in their ...more>>