Data Breach Dissection, Part 2: Biometric Validation
In my previous blog, I looked into the inadequacy of passwords as the last line of defense for administrator portals. With greater awareness of the … Read more
In my previous blog, I looked into the inadequacy of passwords as the last line of defense for administrator portals. With greater awareness of the … Read more
Last week my kids came of age. We received a letter in the mail from our medical benefits provider that one of their data service … Read more