Blog

Suprema America and BioConnect Expand their Partnership to Deliver the Next Generation of Biometric Physical Security
Dallas, TX – September 11, 2023 – Continuing a rich history globally, spanning over a decade, Suprema America and BioConnect have agreed to form a collaborative sales and support structure to...

Facial Recognition vs. Facial Authentication: What’s the Difference and Why Does it Matter?
We are witnessing a world where biometric facial authentication has gained significant prominence as a cyber-physical security measure. It has become the preferred method of security since the...

The Rising Threat Landscape for Cell Towers
In today’s hyperconnected world, where mobile communication has become an essential part of our lives, Cell Towers serve as an invisible backbone for seamless connectivity. However, as our...

The May 31st 2023 Cyber Security Deadline is Quickly Approaching for All Water Treatment Facilities Throughout the US
With over 42% of Water Treatment Plants having no Cyber Security, the May 31st 2023 EPA’s deadline is daunting for many Water Processing Plants. Cyber Physical protection is a critical area that...

Why Thinking Beyond Perimeter Fence Lines is Vital to Your Data Center Security
In today’s world, data is everything. With the increase in digitalization and the growing reliance on technology, organizations are continuously looking for ways to protect their data centers. A...
2022 Trends for Biometrics: Privacy & Compliance
Original post from: Northland Controls https://www.northlandcontrols.com/blog/guest-blog-2022-trends-for-biometrics-privacy-compliance By Julia Webb-Twoomey, VP Marketing & Alliances,...

A Brief History of Biometrics
While they might not be prehistoric, biometrics have been around for thousands of years. Throughout the last few millennia, biometrics have gone from rough methods of classification to being...
From People, to Keys, to Cards and back… to People: The Evolution of Access Control
Access control is nothing new. For as long as people have had doors, there has been someone protecting that door, or keys to lock it. This has evolved into pin pads, card/fob readers, electric...
Looking After We Leapt: What Can the Worst Data Breaches in History Teach Us?
According to ABC News, Yahoo survived two of the largest data breaches in history. In 2013 alone, three billion accounts were breached! What new technology could have prevented these massive...
Seeing Through Hollywood: The Truth About Biometrics and How They Work
Using biometrics, like fingerprints, facial recognition, and retinal scans, has gone from science fiction to daily reality. So we're going to separate fact from fiction, and list the many benefits...
Five Reasons Legacy Systems Fail Security
Security Vulnerabilities Legacy systems are vulnerable to cyber-attacks, and when manufacturers stop offering support for their access control systems, it also means that any security...
Three Ways Enterprise Security is Compromised
Trust is fragile, and often difficult to rebuild. We see this challenge across a wide spectrum, but as we have come to depend on our technology, vulnerabilities have created trust issues from a...