article thumbnail

Security Industry Association Announces Winners of the 2024 SIA New Products & Solutions Awards

Security Industry Association

The prestigious Judges’ Choice Award was presented to Swear for the Swear Authenticity Engine product, submitted in the Software category. Swear ensures an unbreakable chain of custody for digital media, offering real-time, permanent protection of content authenticity through patented technology and immutable blockchain security,” said Swear.

Security 119
article thumbnail

Security Industry Association and International Biometrics + Identity Association Oppose Adding Extraneous Prohibitions on TSA Use of Facial Biometrics in Potential FAA Measure

Security Industry Association

Air travelers have long been required by law to present valid IDs at security checkpoints, subject to inspection for authenticity and checks against flight information. To effectively carry out its mission, IBIA focuses on three core activities: Advocacy, Connectivity, and Education.

Travel 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIA New Member Profile: Wicket

Security Industry Association

Wicket has taken this platform to numerous additional sporting facilities, corporate offices, and other ticketed events, becoming the leader in facial authentication solutions that delight fans, guests, and employees while strengthening security for live events and facilities. And what makes your offerings or your company unique?

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

This can be a serious threat to authentication systems and other security controls. Note that these external interfaces could be subject to authentication and authorization bypass attacks. What Are Authentication Bypass Attacks? Assets that are vulnerable to spoofing include usernames, passwords, and digital certificates.

article thumbnail

SIA New Member Profile: Enterprise Security, Inc.

Security Industry Association

Our Lockdown applications are designed to help you respond quickly and effectively to threats on campus. In the long term: Convergence of genrerative AI and security : In the long term, integrating generative AI content and predictive AI applications with security will become more pronounced.

article thumbnail

How an MSP protects a business’s VoIP systems

Online Computers

Multifactor authentication (MFA) – MFA requires users to provide at least two different factors of authentication before being allowed to access an application or system. This reduces the risk of unauthorized access, as an attacker would need to compromise more than one authentication factor to find a way in.

article thumbnail

World Backup Day: Four Data Protection Best Practices to Know

Pure Storage

Armed with that background, it’s possible to prepare your internal or external cyber threat management team, educate your employees about what to look out for, and how to navigate it. Focus on Security Attacks Before they Happen With any security event, there’s a before, a during, and an after.

Backup 96