Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » authentication

Articles Tagged with ''authentication''

biometrics-freepik1170x658.jpg

What makes an identity? 

Kimberly Biddings
April 14, 2022

By keeping the power of biometric enrollment, companies can stop data breaches or leaks, improve identity and access management, and trust the identity of users.


Read More
industry-4.0-freepik1170x658v4.jpg

Private mobile networks will fuel the 4th industrial revolution

Dean Bogdanovic
March 30, 2022

Private mobile networks make it a great candidate to solve the security challenges and the mobility problem that the Industry 4.0, Digital Transformation, and Industrial Internet of Things (IIoT) bring. 


Read More
cybersecurity-controls-freepik1170x658.jpg

Four security protocols to protect the new normal, a hybrid steady state

Devin Jones
March 16, 2022

 There are four security protocols to consider when reviewing an enterprise's public cloud risk profile.


Read More
digital-ID-freepik1170.jpg

Following in Estonia’s footsteps: Blueprints for a successful digital ID

Kaarel Kotkas
February 25, 2022

Estonia and its modest population of 1.3 million people are leaps and bounds ahead of the rest of the world when it comes to secure e-identity. 


Read More
cyber-hygiene-freepik1170x658.jpg

Implementing strong cybersecurity hygiene standards

Why you should care about implementing strong cyber hygiene in your organization
James Wilde Headshot.jpg
James Wilde
January 27, 2022

Implementing strong cybersecurity hygiene will sharpen standardization throughout your organization and bring increase security and efficiency. 


Read More
cyber-security-freepik1170x658x697.jpg

The new narrative: Cybersecurity in 2022

Jim Bowers
Jim Bowers
January 24, 2022

Threat actors are like the weather: regardless of your desires, they will continue, and that is completely outside of anyone’s control. In response to this, we have to be as proactive as we possibly can. Here are the cybersecurity trends we will see heading into 2022. 


Read More
factory worker

Improving worker safety and security on the plant floor

Bryan Christiansen
January 21, 2022

Security leaders protecting workers and assets in factory environments can implement technology to better secure their access control, authentication and surveillance strategies.


Read More
API-aws-freepik1170.jpg

SEGA Europe S3 bucket left unprotected

January 6, 2022

SEGA Europe allegedly left users' personal information publicly accessible on Amazon Web Services (AWS) S3 bucket. 


Read More
identity-management-freepik23957.jpg

Will the convergence of IGA, PAM and AM fix the fractured identity landscape?

Chris-Schueler.jpg
Chris Schueler
November 29, 2021

Identity is fast becoming less of a tool and more of a strategic framework to secure digital assets and protect data privacy.


Read More
video-conference-freepik006785.jpg

Standardizing video conferencing security guidelines should be a top government priority

George Waller
November 24, 2021

The new realities of communicating in the remote work environment have led to a whole new set of challenges. Initiatives related to protecting users on virtual meeting tools should be at the forefront of every government’s cybersecurity agenda. 


Read More
Previous 1 2 3 4 5 6 7 8 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing