- Authentication Continuous and Seamless User Authentication with Biometrics
Continuous authentication can verify user identity beyond initial login by monitoring behavioral and physiological biometrics—face recognition, walking patterns, voice, and interaction...
- Authentication Creative Options for Better Authentication of Mobile Phone Users
Mobile phone authentication can move beyond awkward passwords and PINs by leveraging built-in sensors for fingerprints, walking patterns, facial geometry, voice, thermal imaging, and grip...
- Career Tips for Getting the Right IT Job - New Cheat Sheet
- Risk Management Mutually-Assured Destruction as a Factor in Cyber Warfare
Since no practical defense exists against nation-state cyber intrusions, countries may need to compromise adversaries' IT assets to establish mutually-assured destruction as a deterrent. Nations with...
- Product Management What Does a Security Product Manager Do?
A security product manager defines product capabilities and drives adoption for information security solutions, working closely with customers, sales, and engineering teams. Unlike most infosec roles...
- Social Engineering Allowing Gullible Victims to Self-Select in Online Attacks
Blatantly fraudulent scam emails may be intentional—by appearing obviously fake, they filter out savvy people who would waste the scammer's time, ensuring only the most gullible victims self-select....