AMES, Iowa – A team of computer scientists is working to defend against the next potential cyber risk – cloud storage. Wensheng Zhang, an associate professor of computer science at Iowa State ...
Legacy systems, often based on keyfob or keycard readers, are becoming increasingly redundant. As businesses increasingly migrate to digital platforms, the modern office has become a hotbed of ...
The security of any organization's data and systems can often be compromised by seemingly benign entities—third-party contractors, vendors and outsourced service partners. While these external ...