Account Security Lockdown

Don't let another minute pass unsecured

Month: May 2017

BrandPost: Running Down the Cloud Dream

When dealing day-to-day with clients regarding cloud initiatives, KPMG Director Corey Jacobson says he sees some that  “chase the value” of cloud — that is, run after their dream of a successful transition to cloud technology without a smooth, well-thought-out strategy.

“They often approach it with a siloed mindset or a fragmented manner,” he explains.  The  business unit might buy a SaaS service, for example, or the infrastructure team might start migrating components to the cloud. But progress isn’t properly tracked and it is unclear whether value was gained overall. “They may promise more effectiveness and efficiency, but don’t really measure it,” he says. 

To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why a hackathon may not be a good strategy for your company

Hackathons, or hackfests, are getting a lot of buzz for being a collaborative, crowdsourced way of generating new product or service ideas. Sometimes they’re even touted for ideas that drive change and create a competitive advantage. But if that’s what you have in mind for a hackathon at your company, prepare for a letdown.

The buzz isn’t all hype. Entirely new companies (such as GroupMe, which was acquired by Skype) have been birthed from hackathons. And Facebook’s “like” button originated in an internal hackathon at Facebook. Some hackathons resulted in government entities capturing new ideas on how to improve government services. And an increasing number of companies find hackathons to be an effective strategy for improving employee engagement.

To read this article in full or to leave a comment, please click here

BrandPost: Introduction to Biometric Modalities

You might associate biometrics with the fingerprint scanner on your smartphone, or the face camera at the airport, but in truth there are a wide range of biometric types, or modalities.

Every biometric modality works along the same basic principle: capture and measure specific biological (anatomical and physiological) or behavioral characteristics, analyze them to create and store a digital representation called a template, then match new captures against the template to verify identity. Where they differ is in what’s captured, how it’s captured, and how easy and accurate the process is.

Friction ridge biometrics identify, store, and compare the complex patterns of the friction ridges found on the fingers or toes, the soles of the feet, and the palms of the hand. Formed in the womb, these ridges are unique to every person and are permanent – two key features of any effective biometric. The technology to capture, analyze, and store friction ridge patterns is already familiar and mature; the capture process is fast and very accurate.

To read this article in full or to leave a comment, please click here

BrandPost: Biometrics – From the Smartphone to the Airport

Use a new smartphone with a fingerprint scanner and it’s hard to imagine one without. Unlocking an iPhone or Samsung Galaxy takes less than a second; just press your thumb against the home button and you’re in. Compared to the old method there’s just no contest – and that’s without the added security benefits for mobile banking and shopping. That’s part of why fingerprint scanners are fast becoming a standard feature, even in budget smartphones.

That’s just one example of how biometrics – the practice of using biological (anatomical and physiological) or behavioral characteristics for automated recognition and verification – is a win-win. Not only does biometrics make the process of identifying and authenticating more secure, it also makes it faster, easier, and more convenient. Only you have the fingerprint (or vocal tract, DNA, or facial characteristics) to unlock the biometrics lock, and there’s no need to remember a password, enter a PIN, or bring along a keycard. You, yourself, are the key.

To read this article in full or to leave a comment, please click here

A1SecurityGuide.com © 2017