Biometric Authentication Part II: Convenience and Security

By | July 19th, 2016|

In Part One of this series, we looked at the topic of government and commercial organizations being hacked. Gaining access to our personal information is the objective of these breaches, and despite massive investments in anti-hacking technology there seems no end in sight. With that vicious cycle in mind, perhaps it’s time to make the [...]

Biometric Authentication Part I: A New Consumer Paradigm

By | July 7th, 2016|

2015, according to the Chinese zodiac calendar, was the year of the sheep. In reality, though, it turned out to be the year of the hack. T-Mobile. ScottTrade. Ashley Madison. Even the U.S. Office of Personnel Management (OPM). All were victims of cyber hacking in 2015, and the personally identifiable information (PII) of millions was [...]