Two West Virginia counties, Harrison and Monongalia, are going to trial a technology that has never been utilized before in […]Read more
The advent of smartphones changed the way we communicate with each other. Smartphones changed our lifestyle and became a part […]Read more
On any mobile device security systems usually have a PIN or password. Despite the emergence of biometric authentication for many […]Read more
With the world getting more connected and digital, cybersecurity is paramount. Hackers can hack a network, and cause massive damage […]Read more
Cloud computing has become more popular than ever in recent years due to its increased accessibility and affordability in the […]Read more
Fujitsu’s ruggedized tablet comes with serious security – palm vein biometrics powered by an integrated PalmSecure sensor.
More and more tablets […]
The following guest post on biometrics for mobile device security was submitted by James Daniels.
The mobile biometrics market is booming. […]
The following is a guest post submitted to M2SYS by Brent Whitfield. He is the CEO of DCG Technical Solutions, Inc.
For many […]
The following is a guest post submitted to M2SYS by Nasrullah Patel
You may be aware of the term “biometrics” – […]
The following is a guest post submitted to M2SYS.
When it comes to an organization’s information security systems, passwords are possibly […]