authentication

April 8, 2020

Fingerprint cloning: Myth or reality?

3 min read

By Paul Rascagneres and Vitor Ventura. Executive summary Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. There are several kinds of biometric authentication, including retina scanning, facial recognition and fingerprint authentication, the most common one. Everyone’s fingerprints are unique, and it is […]

November 27, 2018

SECURITY

Securing Access to Our Nation’s Critical Infrastructure

3 min read

Threats to energy and utilities firms target enterprise IT networks - here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks.

June 14, 2017

SECURITY

Malicious Spam Comes Roaring Back and Cisco Email Security is Ready

4 min read

“Did you get my email? The really urgent one? About funding for your new project?” “Maybe. I can’t tell. My inbox is full of spam and I am busy scrutinizing every email and domain name to make sure the sender is a valid person that I actually know and the attachment is a valid… Oh […]

January 17, 2014

NETWORKING

What Next for BYOD?

2 min read

One of the interesting and challenging aspects of working in the Mobility space is the sheer pace at which the industry is moving.  I’m fortunate to work with many Customers in EMEA to help support and shape their strategy towards Mobile technology.  A great example of this has been the reaction to BYOD. The influx […]

October 17, 2013

PERSPECTIVES

Check Ins – Why location needs to be part of Authentication and Identity

4 min read

Dude, where’s my IP? I love to check in on social networks like Foursquare and Google+. Most of the time, there’s no point to it, but it’s fun to see what friends and colleagues are up to or discover new local haunts. Despite the fun and games, location is much more important to the network […]