Cybersecurity – Identity and Access Management: Building biometric-based ID machines
For the last two weeks, our Cybersecurity – Identity and Access Management series has looked at cybersecurity threats to manufacturers, why they should take them seriously, and how they can thwart them. For the final entry, we will hear from a manufacturer responsible for other people’s security and access management, and the ways it goes about keeping very sensitive, very personal data safe.