BIOMETRIC TECHNOLOGIES TAKE US TO THE NEXT LEVEL - New Work Means New Security Challenges: Work has changed. Advances in mobility and connectivity have accelerated the evolution of the modern business, allowing new types of enterprises to emerge. Thanks to the ubiquity of smartphones, tablets, and other connected devices, the classic nine-to-five workday confined to the cubicles of an office space is no longer the norm.
Biometric authentication in the enterprise? It’s just a matter of time Mobile biometric authentication is officially here to stay. Most of today’s leading devices come with native biometric sensors, and virtually all have cameras, microphones and touchscreens that can be used for biometric authentication. Consumers have embraced this transformation; 86 percent have shown interest [...]
Introduction If you looked into your Magic 8-Ball and asked, “Will I ever be able to stop using passwords for authentication?” it would certainly reply: “Outlook good.” And the outlook is good considering biometrics are making authentication simpler and more secure than ever. Passwords have never looked so retro. But if you asked us the same question, [...]
Identity authentication based on biometric matching continues to grow along with consumer acceptance in both private and public sectors. Biometrics, the unique physical characteristics that all human beings have, include fingerprints and iris scans, as well as facial and voice matching. These modalities can all be used – to various extents – to clearly identify [...]
Facial recognition is here to stay for mobile authentication. It’s fast, easy, and familiar to anyone who has taken a selfie. And thanks to the universal appeal of the selfie, even lower-cost mobile handsets just about now have a front-facing camera. This is important because it means that biometrics can be used to strengthen the [...]
Biometrics are the heir to the password for the reign of secure authentication. There are good reasons for that; our biometrics are naturally unique to us and could hardly be more convenient. They will enable strong authentication to become a seamless, transparent process that make login easier and more secure. But there are different ways [...]
In Part One of this series, we looked at the topic of government and commercial organizations being hacked. Gaining access to our personal information is the objective of these breaches, and despite massive investments in anti-hacking technology there seems no end in sight. With that vicious cycle in mind, perhaps it’s time to make the [...]
2015, according to the Chinese zodiac calendar, was the year of the sheep. In reality, though, it turned out to be the year of the hack. T-Mobile. ScottTrade. Ashley Madison. Even the U.S. Office of Personnel Management (OPM). All were victims of cyber hacking in 2015, and the personally identifiable information (PII) of millions was [...]