AMES, Iowa – A team of computer scientists is working to defend against the next potential cyber risk – cloud storage. Wensheng Zhang, an associate professor of computer science at Iowa State ...
Managing access can be quite a daunting task in mid-to-large sized enterprises. Having a good answer for “Who should have access to what?” is not easy, to say the least. With a myriad of existing ...
By providing access based on the individual’s repetition of a rhythm pattern received at a portable computing device, implementations provide an access control technique that is unobtrusive and easy ...
Securing decentralized and complex university networks is always going to be a challenge, but here’s how PAM can help. Then, there are the uniquely collegiate challenges that higher education IT ...