AMES, Iowa – A team of computer scientists is working to defend against the next potential cyber risk – cloud storage. Wensheng Zhang, an associate professor of computer science at Iowa State ...
By providing access based on the individual’s repetition of a rhythm pattern received at a portable computing device, implementations provide an access control technique that is unobtrusive and easy ...
Securing decentralized and complex university networks is always going to be a challenge, but here’s how PAM can help. Then, there are the uniquely collegiate challenges that higher education IT ...