Is Your Identity at Risk from Biometric Data Collection?

by  | 

When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while biometric data is increasingly collected with abandon, this practice is under-scrutinized, pushing us further in the direction toward data dystopia.

BeyondTrust Named a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management

by  | 

BeyondTrust received 92 reviews for a rating of 4.6 on a five-point scale. Reviews were submitted across all products in the BeyondTrust privileged access management (PAM) solution set, including our Password Safe, Endpoint Privilege Management and Privileged Remote Access solutions.

The Implications of Network Time Protocol (NTP) for Cybersecurity

by  | 

Network Time Protocol (NTP) is a networking protocol used for clock synchronization of networked computing devices. While it is one of the oldest networking protocols—dating back to 1985—it remains a cornerstone of modern computing synchronization, and it is crucial for maintaining the proper operation and security of computing devices. This blog will cover some implications of NTP on cybersecurity and how to ensure proper NTP settings across all endpoints.