Biometric authentication News
April 18, 2017
Innovative mobile security technology has been developed to offset vulnerabilities, but using cutting-edge solutions such as automation could come back to haunt IT execs.
November 20, 2016
With the rise of multifactor authentication and updates to Apple iOS security, there is a lot to look forward to next year. Four experts gaze into the enterprise mobility crystal ball. Patrick ...
October 06, 2016
Snap, Inc., the company behind the popular photo and video messaging app Snapchat, is releasing a pair of photo and video-capturing glasses that have some worried about the possible privacy ...
August 19, 2016
Recent advancements in mobile security technology allow smartphone vendors to offer more built-in features, such as the iris scanner in the new Samsung Galaxy Note7.
Biometric authentication Get Started
Bring yourself up to speed with our introductory content
As mobile biometrics technology becomes increasingly common, it is important for IT to know how to support this kind of authentication and the security vulnerabilities it may still bring. Continue Reading
The internet of things is making its way into prisons, changing how inmates interact with others and are monitored. But it's not without its pitfalls. Continue Reading
An ECG can do more than monitor a heart's health. Learn a host of scenarios biometry can be used in a connected environment. Continue Reading
Evaluate Biometric authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Biometrics has become a hot topic in mobile technology, as it provides a valuable layer of security to devices and apps. Refresh your memory on the authentication method with this quiz. Continue Reading
The FIDO authentication standard could eventually bypass passwords, or at least augment them, as government and industry turns to more effective authentication technologies. Continue Reading
Identity management is a core component of cybersecurity readiness, but there are many layers and complexities behind it. Expert Peter Sullivan explains the basics of IAM. Continue Reading
Manage Biometric authentication
Learn to apply best practices and optimize your operations.
With security hazards around every corner, IT must know where to draw lines of defense. A best practice is implementing layered mobile security. Continue Reading
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading
IT leaders are adding more security layers in an effort to protect against mobility threats. What tools are in their portfolios? Continue Reading
Problem Solve Biometric authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Two-factor authentication systems require more than using codes sent through SMS and smart cards. Expert Michael Cobb explains how to properly and effectively implement 2FA. Continue Reading
Millions of fingerprint records were exposed in the OPM breach. Expert Michael Cobb explains how attackers can abuse such biometric data and what enterprises can do about it. Continue Reading
Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products. Continue Reading