by Andre Boysen | Sep 30, 2014 | Authentication
One of the more difficult aspects of cybersecurity and access management remains the rising rate of end points, with the average employee already having nearly three devices on average. Despite the fact that the Internet of Things and enterprise mobility trends have...
by Andre Boysen | Sep 30, 2014 | Passwords and Credentials
Data breaches have reached somewhat epic proportions in the past several years, with tens of millions of individuals being impacted by just one event at a time, and many more when looking at the full range of damages. For example, the two breaches that struck the...
by Andre Boysen | Sep 30, 2014 | BYOD
Organizations in the public and private sectors have appeared to fully embrace the BYOD revolution, enabling remote work through the use of smartphones, tablets and portable computers among their employees. This has been a highly effective and positive trend for...
by Andre Boysen | Sep 30, 2014 | BYOD
Mobile developers, be they in the software or hardware field, have become a bit more focused on security in the past few years, as smartphones, tablets and other portable devices have been some of the most common sources of data breaches. Although devices have...
by Andre Boysen | Sep 30, 2014 | Authentication, Video
Transcript The U.S. government tries to protect the nation, but can it protect itself? Hi there, and welcome to the SecureKey blog. Network World recently reported that officials from the U.S. military have been concerned about data breaches that have taken place in...