News

Last September, I wrote a blog covering a status update on the federal government deadline arriving on implementing a zero-trust cybersecurity model, along with some state government implications. But ...
A team of researchers have developed a method for extracting authentication keys out of HID encoders, which could allow hackers to clone the types of keycards used to secure offices and other areas ...