Biometrics in government: Enhanced security and convenience for citizens

2019-08-28T09:52:04-04:00By |

A brief history of biometrics Fingerprint-based identification began in law enforcement. An Argentine detective first solved a crime using a latent print (left behind by the perpetrator) in 1892. In 1901, detectives in England and Wales officially began using fingerprints in criminal identification. Their use snowballed from there. By 1946, the FBI managed a [...]

PODCAST: Aware’s David Benini Talks On-Device Biometrics & Enterprise Security

2019-08-28T09:52:19-04:00By |

An expert conversation on the death of the password, biometric liveness detection, and the future of identity in the workplace. It’s On-Device Biometrics Month at FindBiometrics, a five-week deep dive on the authentication paradigm that’s killing passwords. That’s why, in the latest episode of The FindBiometrics & Mobile ID World Podcast, host Peter Counter sits down with David Benini, [...]

Using biometric authentication to elevate enterprise security

2019-08-28T09:54:03-04:00By |

Biometric authentication in the enterprise? It’s just a matter of time Mobile biometric authentication is officially here to stay. Most of today’s leading devices come with native biometric sensors, and virtually all have cameras, microphones and touchscreens that can be used for biometric authentication. Consumers have embraced this transformation; 86 percent have shown interest [...]

The Case for Multimodal Biometric Authentication in the Enterprise

2019-08-28T09:54:22-04:00By |

Identity verification has always been a cornerstone of enterprise security. Businesses must be able to create identities for each of their employees, and determine the extent of access granted to those identities across physical and digital assets. They also need to authenticate the identity of users each time they attempt to access an information system [...]

Aware lands among Enterprise Security Magazine’s Top Ten Multifactor Authentication Solution Providers for 2018

2019-08-28T09:54:46-04:00By |

Passwords were conceived for the computing systems of the 1960s; they are insecure and inconvenient for users of today’s Internet-centric computing environment. No matter what we do to shore up their effectiveness, hackers devise new ways to defeat them. Phishing, interception, knowledge-based guessing, brute-force attacks, and large-scale data breaches make authentication based solely on passwords unacceptably vulnerable.