Transcript Apple has claimed that it was not responsible for the breach that exposed celebrities' intimate pictures, but the firm is not leaving it at that. Hello there, and welcome to the SecureKey blog. Mashable recently reported that Apple's Chief Executive...
Some of the most common causes of data breaches and access management failures have been tied to poorly configured or integrated systems, as flaws are some of the favorite entry points of hackers and other threats. This can be in relation to applications, devices or...
One of the more difficult aspects of cybersecurity and access management remains the rising rate of end points, with the average employee already having nearly three devices on average. Despite the fact that the Internet of Things and enterprise mobility trends have...
Transcript The U.S. government tries to protect the nation, but can it protect itself? Hi there, and welcome to the SecureKey blog. Network World recently reported that officials from the U.S. military have been concerned about data breaches that have taken place in...
Transcript Payment processing systems have been consistently called into question in recent years, and Apple might just have the answer. Hi there, and welcome to the SecureKey blog. TechTarget reported last week that the highly anticipated Apple Pay function that will...
Passwords and other traditional credential systems have been catching a wealth of bad press in the past few years, as breaches continue to be traced back to mismanagement of simple login codes. They say "fool me once, shame on you; fool me twice, shame on...