Jeff Costlow, CISO at ExtraHop, makes the case for implementing next-gen intrusion-detection systems (NG-IDS) and retiring those noisy 90s compliance platforms. After more than 20 years of ...
I wrote this in 2004 for the San Francisco Chronicle, but it's still important. In recent years there has been an increased use of identification checks as a security measure. Airlines always demand ...
Security practitioners diving into cloud computing must make older security tools like IDS work in this new world. In a CSO podcast last week, Stu Wilson, CTO of IDS provider Endace, sought to explain ...
Jimmy Roussel, COO of IDScan.net As digital identity verification becomes increasingly sophisticated, so too do the methods used by bad actors to exploit security gaps. From biometric authentication ...
Responses to intrusion alerts from an intrusion detection system can be passive, active or investigative. The IDS can simply announce that there’s a problem, produce reports and let users handle the ...
The technology for the relying party to accept mobile IDs has lagged behind the applications that distribute the credentials. We are focused on bridging that gap for security businesses.” — Hannah ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results