Opinion



By Marty Greenlow, CEO, Ensighten Today’s senior executives are under great pressure to transform their organizations for the digital world. Although this digital transformation imperative has been underway for several years now, we’re currently seeing a significant shift within the C-suite when it comes to ownership of these colossal undertakings. […]

The Implications of Shifting Digital Transformation Responsibilities


What if Sherlock Holmes was a robot?  This question is obviously designed to provoke thoughts on how the integration of automation and investigation could yield some interesting results.  Appropriately, it is being used as the tag line for SecBI’s current marketing campaign.  SecBI’s Autonomous Investigation technology provides automated detection and investigation that […]

What If Sherlock Holmes Was A Robot?



By Tom Piston, Farpointe Data U.S. Eastern Regional Manager For the past several years, there’s been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the United States Federal Trade Commission (FTC) […]

Eliminate the Word “Portals” from Mobile Access Control Discussions



By: Darrell Laffoon, CTO of EZShield + IdentityForce Chances are, you or someone you know has been impacted by identity theft and cybercrime — even if they don’t know it yet. The fallout from such a personal intrusion into your most confidential personal information can affect every aspect of your […]

Preventing Cybercrime and Identity Theft in 2019: How to Transform ...



Guest Contributor: Jeremy Moskowitz Last year, Merriam-Webster added the word, “Bitcoin” to its latest version of the authorized Scrabble dictionary game. As the most recognized form of cryptocurrency, bitcoin has become embedded in our vocabulary thanks to the barrage of media stories outlining it ascension to financial investment stardom in […]

Why Bitcoin and Other Cryptocurrencies Spell Trouble for Cybersecurity


By Don Boxley, CEO and Co-Founder, DH2i (www.dh2i.com)  Regardless of where it originates – commercial, nonprofit, or government agency – data is moving into the cloud at breakneck speed.  One important reason for this is to support today’s increasingly decentralized workforce and its accessibility requirements.  And, not only are workforces increasingly spread-out […]

How Software Defined Perimeter Solutions Can Improve Data Security Over ...